IOCSETD(r11, 0x5423, &(0x7f00000000c0)=0x5) 01:36:13 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x2) openat$audio1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio1\x00', 0x141000, 0x0) setuid(r4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r8, 0x8982, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(r7, 0xc0405610, &(0x7f0000000000)={0x9, 0x7, 0x0, 0x800, r11}) fsetxattr$security_capability(r12, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x81, 0x4}, {0x5, 0x401ff}]}, 0x14, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r13, 0x40045431, &(0x7f0000000040)) r14 = syz_open_pts(r13, 0x0) ioctl$TIOCSETD(r14, 0x5423, &(0x7f00000000c0)=0x5) r15 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r7, 0x80085617, &(0x7f0000000200)=0x0) r17 = syz_open_dev$media(&(0x7f0000000300)='/dev/medi!#\x00', 0x100, 0x101800) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000400)={0x1, 0x30314142, 0x9, 0x3, 0x1, @discrete={0x7, 0x1}}) fcntl$dupfd(r19, 0x0, r18) epoll_ctl$EPOLL_CTL_ADD(r17, 0x1, r18, &(0x7f0000000340)={0x100000008}) ioctl$VIDIOC_S_STD(r15, 0x40085618, &(0x7f00000002c0)=r16) [ 1477.315362] mkiss: ax0: crc mode is auto. [ 1477.468635] mkiss: ax0: crc mode is auto. 01:36:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 01:36:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000000)={0x11, 0x1b, 0x0, 0x1, 0x7f, 0x6, @random="707990726719"}, 0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000100)={0x1, 0x0, 0x4, 0x1f, 0x12, 0x0, 0x0, 0x40, 0x0, 0x20000, 0x0, 0x20000}) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x80000, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r5, 0x0, 0x1420000a77, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000300)={'team_slave_1\x00', @broadcast}) pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r6, &(0x7f0000000200)=""/250, 0x50c7e5e2) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000580)={@loopback, 0x4e, r7}) bind$bt_hci(r3, &(0x7f0000000400)={0x1f, r7, 0x3}, 0xc) r8 = syz_open_pts(r2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r11, 0xc1105511, &(0x7f00000006c0)={{0x7, 0x5, 0x0, 0x3c8f, '\x00', 0xff}, 0x1, 0x1, 0x2, r12, 0x6, 0x7ff, 'syz0\x00', &(0x7f0000000100)=['\x00', 'nodevself\x18[mime_type-\x00', '/dev/vsock\x00', 'team_slave_1\x00', ']\x00', 'vboxnet0userem1,eth1+),///.\x00'], 0x4d, [], [0x9, 0xa7, 0x81, 0x200]}) ioctl$TIOCSETD(r8, 0x5423, &(0x7f00000000c0)=0x5) 01:36:16 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:16 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) setsockopt$inet6_int(r12, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r12, &(0x7f00000092c0), 0x4ff, 0x0) clock_gettime(0x0, &(0x7f0000001540)={0x0, 0x0}) recvmmsg(r12, &(0x7f0000001680)=[{{&(0x7f0000000300)=@can, 0x80, &(0x7f0000001440)=[{&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f0000000400)=""/35, 0x23}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x3, &(0x7f0000001480)=""/86, 0x56}, 0xff}], 0x1, 0x140, &(0x7f0000001580)={r13, r14+30000000}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001600)={&(0x7f00000015c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 1479.622176] FAULT_INJECTION: forcing a failure. [ 1479.622176] name failslab, interval 1, probability 0, space 0, times 0 [ 1479.642318] selinux_nlmsg_perm: 66 callbacks suppressed [ 1479.642330] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.662162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.671609] CPU: 1 PID: 14546 Comm: syz-executor.4 Not tainted 4.14.157-syzkaller #0 [ 1479.676687] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.682139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1479.682145] Call Trace: [ 1479.682173] dump_stack+0x142/0x197 [ 1479.682195] should_fail.cold+0x10f/0x159 [ 1479.682212] should_failslab+0xdb/0x130 [ 1479.682225] kmem_cache_alloc_node+0x287/0x780 [ 1479.682246] __alloc_skb+0x9c/0x500 [ 1479.707595] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.709909] ? skb_trim+0x180/0x180 [ 1479.709924] ? netlink_autobind.isra.0+0x1c9/0x290 [ 1479.725815] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.726520] netlink_sendmsg+0x874/0xc60 [ 1479.726538] ? netlink_unicast+0x650/0x650 [ 1479.757276] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.759190] ? security_socket_sendmsg+0x89/0xb0 [ 1479.759205] ? netlink_unicast+0x650/0x650 [ 1479.775476] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.779547] sock_sendmsg+0xce/0x110 [ 1479.779560] ___sys_sendmsg+0x70a/0x840 [ 1479.797305] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.800782] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 1479.800794] ? __fget+0x210/0x370 [ 1479.800808] ? find_held_lock+0x35/0x130 [ 1479.800817] ? __fget+0x210/0x370 [ 1479.800832] ? lock_downgrade+0x740/0x740 [ 1479.812124] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.820648] ? __fget+0x237/0x370 [ 1479.820663] ? __fget_light+0x172/0x1f0 [ 1479.820673] ? __fdget+0x1b/0x20 [ 1479.820689] ? sockfd_lookup_light+0xb4/0x160 [ 1479.820702] __sys_sendmsg+0xb9/0x140 [ 1479.850818] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14544 comm=syz-executor.5 [ 1479.852585] ? SyS_shutdown+0x170/0x170 [ 1479.852610] SyS_sendmsg+0x2d/0x50 [ 1479.891751] ? __sys_sendmsg+0x140/0x140 [ 1479.895829] do_syscall_64+0x1e8/0x640 [ 1479.899948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1479.905745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1479.912108] RIP: 0033:0x45a679 [ 1479.915297] RSP: 002b:00007fd4f7e43c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:36:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffe76) setuid(r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r8, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000040)) r10 = syz_open_pts(r9, 0x0) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x300101, 0x0) write$P9_RREAD(r11, &(0x7f0000000100)=ANY=[@ANYBLOB="2c1434e2260f4979039e8c1ef62b6ec50d27e86ab2939540976e92b28c1ee1af00"/46], 0x2e) r12 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r12, 0xc008ae67, &(0x7f0000000240)={0x40, 0xffffffff}) ioctl$TIOCSETD(r10, 0x5423, &(0x7f00000000c0)=0x5) 01:36:16 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) setsockopt$inet6_int(r12, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r12, &(0x7f00000092c0), 0x4ff, 0x0) clock_gettime(0x0, &(0x7f0000001540)={0x0, 0x0}) recvmmsg(r12, &(0x7f0000001680)=[{{&(0x7f0000000300)=@can, 0x80, &(0x7f0000001440)=[{&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f0000000400)=""/35, 0x23}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x3, &(0x7f0000001480)=""/86, 0x56}, 0xff}], 0x1, 0x140, &(0x7f0000001580)={r13, r14+30000000}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001600)={&(0x7f00000015c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 1479.923170] RAX: ffffffffffffffda RBX: 00007fd4f7e43c90 RCX: 000000000045a679 [ 1479.930442] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1479.937722] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1479.945002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4f7e446d4 [ 1479.952275] R13: 00000000004c8e3c R14: 00000000004e0778 R15: 0000000000000004 01:36:16 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1480.068605] mkiss: ax1: crc mode is auto. [ 1480.076825] mkiss: ax0: crc mode is auto. [ 1480.111866] FAULT_INJECTION: forcing a failure. [ 1480.111866] name failslab, interval 1, probability 0, space 0, times 0 [ 1480.161250] CPU: 1 PID: 14568 Comm: syz-executor.4 Not tainted 4.14.157-syzkaller #0 [ 1480.169180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1480.178547] Call Trace: [ 1480.181180] dump_stack+0x142/0x197 [ 1480.184833] should_fail.cold+0x10f/0x159 [ 1480.189004] should_failslab+0xdb/0x130 [ 1480.192992] kmem_cache_alloc_node_trace+0x280/0x770 [ 1480.198138] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1480.203688] __kmalloc_node_track_caller+0x3d/0x80 [ 1480.208630] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1480.213327] __alloc_skb+0xcf/0x500 [ 1480.216961] ? skb_trim+0x180/0x180 [ 1480.220726] ? netlink_autobind.isra.0+0x1c9/0x290 [ 1480.225666] netlink_sendmsg+0x874/0xc60 [ 1480.229743] ? netlink_unicast+0x650/0x650 [ 1480.233989] ? security_socket_sendmsg+0x89/0xb0 [ 1480.238757] ? netlink_unicast+0x650/0x650 [ 1480.243006] sock_sendmsg+0xce/0x110 [ 1480.246732] ___sys_sendmsg+0x70a/0x840 [ 1480.250719] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 1480.255478] ? __fget+0x210/0x370 [ 1480.258965] ? find_held_lock+0x35/0x130 [ 1480.263034] ? __fget+0x210/0x370 [ 1480.266530] ? lock_downgrade+0x740/0x740 [ 1480.270696] ? __fget+0x237/0x370 [ 1480.274171] ? __fget_light+0x172/0x1f0 [ 1480.278150] ? __fdget+0x1b/0x20 [ 1480.281524] ? sockfd_lookup_light+0xb4/0x160 [ 1480.286027] __sys_sendmsg+0xb9/0x140 [ 1480.289833] ? SyS_shutdown+0x170/0x170 [ 1480.293830] SyS_sendmsg+0x2d/0x50 [ 1480.297376] ? __sys_sendmsg+0x140/0x140 [ 1480.301443] do_syscall_64+0x1e8/0x640 [ 1480.305340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1480.310198] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1480.315492] RIP: 0033:0x45a679 [ 1480.318692] RSP: 002b:00007fd4f7e43c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1480.326408] RAX: ffffffffffffffda RBX: 00007fd4f7e43c90 RCX: 000000000045a679 [ 1480.333683] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1480.341398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1480.348787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4f7e446d4 [ 1480.356067] R13: 00000000004c8e3c R14: 00000000004e0778 R15: 0000000000000004 01:36:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000480)={[{0xffffffff, 0x2, 0xf8, 0x1, 0x81, 0x7f, 0x1f, 0x6, 0x1, 0xeb, 0x6, 0xdf, 0x3}, {0x1, 0x0, 0x4, 0x80, 0x0, 0x0, 0x9, 0x1, 0x1, 0x28, 0xfc, 0x3f, 0x41a}, {0x9, 0x8001, 0x2, 0xc1, 0x44, 0xf8, 0xff, 0x3f, 0x8, 0x80, 0x6e, 0x5}]}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000, r11}) ioctl$DRM_IOCTL_ADD_BUFS(r12, 0xc0206416, &(0x7f0000000200)={0x4, 0x100000, 0xffffff81, 0xfffffffb, 0x10, 0x7ff}) connect$l2tp(r5, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r8, 0x3, 0x3, 0x1, 0x4, {0xa, 0x4e24, 0x3, @remote, 0x283d}}}, 0x3a) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r15, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x4}) r16 = syz_open_pts(r15, 0x0) ioctl$TIOCSETD(r16, 0x5423, &(0x7f00000000c0)=0x5) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x62020}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x1a8, 0x0, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x596}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x65bf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7cf6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x954}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffff001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x8b6b0221880ce731}, 0x0) 01:36:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 01:36:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) setsockopt$inet6_int(r12, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r12, &(0x7f00000092c0), 0x4ff, 0x0) clock_gettime(0x0, &(0x7f0000001540)={0x0, 0x0}) recvmmsg(r12, &(0x7f0000001680)=[{{&(0x7f0000000300)=@can, 0x80, &(0x7f0000001440)=[{&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f0000000400)=""/35, 0x23}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x3, &(0x7f0000001480)=""/86, 0x56}, 0xff}], 0x1, 0x140, &(0x7f0000001580)={r13, r14+30000000}) 01:36:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_IRQCHIP(r4, 0x8208ae63, &(0x7f0000000100)={0x4, 0x0, @ioapic={0x2, 0x8, 0xfffff000, 0x20, 0x0, [{0x8, 0x0, 0x7, [], 0x80}, {0x6, 0x6, 0x8, [], 0x1}, {0xb9, 0x0, 0x0, [], 0x2}, {0x0, 0x7f, 0x8, [], 0x8}, {0x80, 0x50, 0x20, [], 0xff}, {0x20, 0xf0, 0xa4, [], 0x4}, {0x3, 0x1, 0x0, [], 0x9}, {0x4e, 0x8, 0x62, [], 0x6}, {0xf7}, {0x2, 0x8, 0x9e, [], 0x5}, {0x5, 0x1, 0x83, [], 0x9}, {0x0, 0x3, 0x20, [], 0x4}, {0x0, 0xff, 0x3, [], 0x80}, {0xff, 0x2, 0x1f}, {0x6, 0x40, 0xcb}, {0x40, 0x7, 0x5, [], 0x1}, {0x4, 0x0, 0x81, [], 0x7f}, {0xaa, 0x7f, 0x2, [], 0xb1}, {0xe1, 0x40, 0x1f, [], 0x4}, {0x0, 0x2, 0x5, [], 0x7f}, {0x1, 0x1, 0x2, [], 0x8}, {0x6, 0x0, 0x2, [], 0x1f}, {0x6, 0xf9, 0x40, [], 0x7}, {0x60, 0x5, 0x7f, [], 0x6}]}}) setuid(r1) epoll_create1(0x80000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x6}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0xb) 01:36:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socket$inet(0x2, 0x80000, 0xd1) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x1, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000200)=0x3, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x280000, 0x0) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000180)={0x20, 0x8000, 0xc7}) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r5 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) 01:36:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000140)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f00000002c0)={0x20, 0x1, "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"}) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x412040, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r10, 0x0, 0x4e, 0x7e, &(0x7f0000000180)="69c4bad11bcdf55fa72954d55446c17e1731a8e2dbf513258453e5e51636eabaf7ef3a935bbd544f7aea23b11a6d0151e4262258d916a9b574db79ba721d92af7b73581f85bf821d73e512def4e4", &(0x7f0000000400)=""/126, 0x4, 0x0, 0xfb, 0x9e, &(0x7f0000000480)="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", &(0x7f0000000580)="a62b36c8450f2a6e124cdbe180405385c808c22e027b54cc27498d8741b025f8c310b8c2ea96ad97b8f5b2c5f9e6e0827ac59feccbbd36f5b184053a2cc7bb1dad0424afb8c9dded69835f67391a8a46685462fd2ecf1fb6e3ee284327a205b5f7141b1da59e2e33b8527a87a0a6287d490ebd09aa2d2fb133341d668e0635508d865f71f1ae76ba58b16cc4a653b4cee3a0faa41f5e4a8d1620b17e89b6"}, 0x40) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000100)=0x6) 01:36:19 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) setsockopt$inet6_int(r12, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r12, &(0x7f00000092c0), 0x4ff, 0x0) clock_gettime(0x0, &(0x7f0000001540)) 01:36:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$isdn_base(0x22, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x406840, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev\a\x00\x00\x00eo35\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffdec, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, r2, 0x3ecb7b9d36d9df7d, 0x0, 0x80, {}, [{{@pci={{0x0, 0x1, 'pci\x00'}, {0x0, 0x2, '0000:00:10.0\x00'}}, {0x0, 0x3, 0x3}}}]}, 0x7c}}, 0x4044000) 01:36:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 01:36:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x17) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r4, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:19 executing program 1: getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@random={'security.', 'mime_type\x00'}, &(0x7f0000000140)=""/8, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x9}}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f00000000c0)={0x0, @frame_sync}) 01:36:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDGKBMETA(r7, 0x4b62, &(0x7f0000000000)) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="e3ffffff8c0bb0499dd3a4f67f12f00c78e2171f2e96c75e2026b8264f145703557e029373965c7a60f556697ed2b7f1ab90e8c7a0ec0a975f10e1d94b0cc371274acc2198bea27d0f1a04c18661c30d94d2eac40e1e3ec5f579ecffa901213e27b4457215b6c558d5eea813c10421ee6a58f40d7139a490838978866c14bc3b5f7206f99c15241887d6df75d6698a126e0d7c0b2b65088b773a7fa8958e9d02f1c2243693e9f282960a479f6fcdc61681c56fd77b2d3180d838c8858d9ae1006abfea566e091e8ce009461f772fd42f9f8544e2071337", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r9, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0x70, &(0x7f0000000100)={r9, @in6={{0xa, 0x4e21, 0x80000000, @mcast1, 0x7fff}}, [0x6, 0x80000000, 0x1000, 0x8, 0xfffffffffffffffd, 0xffff, 0x20, 0x81, 0x9, 0x8, 0x7fffffff, 0x9, 0x4, 0x1, 0xffff]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000200)={r10, 0x8001, 0x6, 0x0, 0x10000}, &(0x7f00000002c0)=0x14) r11 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r11, 0x5423, &(0x7f00000000c0)=0x5) 01:36:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getpgid(r4) setuid(r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)) r7 = syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) 01:36:20 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) setsockopt$inet6_int(r12, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r12, &(0x7f00000092c0), 0x4ff, 0x0) 01:36:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x1000}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000200)={0x2, r8, 0x1}) r9 = syz_open_pts(r5, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x94, 0xa05bf3e9e0f0aeca) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) vmsplice(r0, &(0x7f0000001900)=[{&(0x7f00000005c0)="dbfbc0ea269782b1bb0af0a9ad55b5976de938dd5eed6e7b4ffa78433a53e57df8c6853fc078e90ee0d3b7d5e8d23ce5fcef950f5b50ea6218de699d4e4a07305b5188812dbd89386d5f079d824f1d170ca9e33bb553bf1b952572c9ea4f599f0cb16f4a03110f6f100fcabb7800a53879808f412d03475e01d0ebbddb9e39b0157125b56e36b3e21ec5ab789082834b1fc8beaeb6d2c8055b48d5843015c5c254170c3392fe08f7b679638dcbd0d2a17f0b9edd12ae4f93c2ca683b7311cef50dc7c47586cd7d69f50bfc81069c05", 0xcf}, {&(0x7f00000006c0)="4692a07b12a73772bc562b0e1c235c60013066f61d501782dc22e0c8f25334eb608e6040de19a76abd9681f03bfa9e25729f1c6870c44842a6574f1e8ce840c6da85f1299ee2941caafff93bb3a4f87dff38da6d", 0x54}, {&(0x7f0000000000)="3ea110d00ce6c20e06bc6e7ff87b6fe7a98ac4a460ade5aad08b", 0x1a}, {&(0x7f0000000740)="6094c909a816de210f9fe528422bededf158b6472dc714635154b2bc0d82fe4925b06c682964c2a9e30901461070a16b7f4a8ddbda78418e0efd728f0a761e4b102f96e9c00d0af636144fe2602eaf008300a5fb44879ad5a438cbd6c443797ba1185ba2f8759bfb60dca3e796fe6aea6379b60ba1fed2b460d39d719a305def505b0516686b89e075aec4eb8ce3977cc5a72265220125bd59b6078315cdfd6401af2ec51b3f533f70c2b9957be02a0db9e9e68f23fe9d77942e64e193b16b09253aa87e37909044120f4f7b1fc2eae73b2e5e23788c8144c236eeff95f874094483ac00165326dc92df058b923da93a64c8db81bb25dc6ef3968d1cbfb55b21b9515b0b80279c0e21e695258c4dbfcf060ae8c61ae9d02cf0ea9aa61368c26f9fac62a7f0db1dc9fbbe3eea9a6c706cc474aae5ab63b8a826dbcf8686d1e98b79601d45b1c24a7e740bed079e66c708ad290e00870f5711279266d8638dec3938f160ac98c7d7b8ecb1e1ae1279963896363ece6be3c5f59b6d8e12319a10795a738881c71aff77ecd9542cb3c833a54e522bf1d34409c2918b1feaa1fa194b5ee36cceddb383a808787fc631cb9fc66a5df803494c551802c5d9c5c90ddf32046f624a1ceecf7019143a02bfa660bb9de70511b9aaa15f3920d714f0a5906750303a5aa57e2986700e8a3591367486b07bf66856426243ffee4007bbf834c78b7c4bb7a49bedcfc12781eeab20f5393b61bb18a10117d709c00b07c4a8b52f944e4c8f1d69075d1431b1752b0492605133c90da6ea17d06ef33b3e2275d91da1dfb34cf57b6f9e6b34e18cf406c965fa610aa80a5523f8641edb79cec824279d7733b616653066b00cbaa803517bdd91ee388d73ad2b280c9f6def3010c2bce9039f67332e8ca8fe9cb39f83d30690c3e84f62f909a90e755e685fa3d11344d4e53cecffdd3a40d7e16d7f1850fa9c4c04dfb155788827e0d34e4309ab4740dec6fff079e548b6f5a5ac70c434f843abbb7a0449efa32f44b685d4331c95b116a3fd6d7c428b170efe0c63f78821550f73965d5bca3c823d7891a0028e9b7536de4012a8aa81d306b984bbe7e505edb0720b6fb6411282fd250915a016291a74e3dff2a832452ae7583b2ac9af90f05ef272c51c9fadc9930330466e9f0dd7e4fe34df60cdc6a9b0747ece7bccb03ee67c606e71d2ea6235f851a041502882b6556c8acfa66445def94367c68d982b32853d4d9fe69221514bb3cd11c6c11a8af4952969907726e74b89085ba07c863194e84acbebd7b283ce233a706c5e80f0e02d002544871d19636607c56adac06de3e5c3fb56ee62d23eb9d10d0489338dacb078792c3074d9c28261bda0e4dd771d946ad33edae32383b8de0bd4ad52b6343c411e4866900898e3389d67c1e4044194d1b286051ca22ee8ad5e10d480397c427310df7245fbbc3ec26ca25405d22fe18a5efdc38498df7f4ec9c7180a5c13bc285d85b22b963828c8bb00d1c60279f5999d4a927f4bbe6c2cd05a17e021994d184445261ed81e38c17de226be52da678b21c210c697f07b39c7af943bba313404095fa1ab8ab6e6fdc0378a63e4716e0e8be77d6d05ea0008107cbd2c797f155bb6a744a75303c0ded2a426134e54023c148061e5192389ac7d35be1e66e4e0dec63a8a42e7655a184039d258e2fa893856493ceb3bf5dc35d0ea927738a099fc292cbd9f6e8de7bd2388e21b22c63a2425a4553d1446b2b2717f5ccde01685c79960e6d980d7233cb11164713a0696354bc756dcef71f7860ab0ab96c9402d93afecc6ddfd10ad01fe58ac2084192d98ec980753184a00486eb3e233cbd1205b70a6b3b82945504382c20ac4c5d717051701b5f6e21c0c5be451b2e76900e771db2861a07e572164b5f2af2654b7f6a9e280c7639769bf3a5018585d9c93ec0f35a39616801cac631fcd9d45aec5a0eb461ce19fd193cc8713ea52fe47c4641740d11264c64115cab8a06c1c1fec4531fa6471d8aa84492f7edf7c0b1182336209db2a115997f104792d73a49ac65252b0b09dbf3b39069b6969bc88ae4e8559deba8e1be57f5da3c36815c5fd75ee39e3bb4d0fea215af983e4a36d10b8f0a3b59cca3c889d4f0d53ee068d61c96150b371126aa7a31193a90f9155526806bc79d2e4703f5578bdf1e4711979ae0428ea9d4f991cb7e2bb06888c3acc3491a6c41d0de0159aabbde852915a505f3cf4994b8ad73ce2235b173014c1f80119364e7d91bd8fc555a9c3a635b629fed299f8e14504ce660580748972e9a2962b068854c5c320d52c2cdca41d2a8c7e1e4b0df8272ef6ff6a752b38d7f9586aedfe71f84878d7f95c8787e5b154783c5d0161d3515e23336de524cf818eb56c048976208349f7e246c711a59ecfe5790d552519a1c201d5d1b8b40d692dd6cfca5cb1525b28762136c7d3f3cda0fa1d5d11405b289305e5876d1f80958f4412d1a4e02762a012aa002d9eaaf7f1c112f404241682e35f1249cc42110d6c7242a7278a3db3facf02bc52cc7b68734fdba05c05b6be20651c8a48a7835ca9ba13aa2d55a73cbd2604740544e9a3ae000658b74b195a2127c74d1d3d441f7171d527d6547f240aae5f1fd56c7ca14fc88f3764fda559812e874b5f5a6e3dfff656928186bebf42147c6803d821a9f702d02e179f8fa8de0d201d9ae0bfd8e9fbacd98ef2c1b151744642ec3835fc9cd0707004ff26ef2a94e45540d939cc1b5560ae392ac373cfb6449722d7d4f6d645ac15e70a3e841ab3b61d96df69023a62d28943f9bb3022dead38f185515217f277ba107893f22dbc42a94ab225f214645e349ee353c0eed51ab03f0e8c9db57b8943cb0952ff0c255cda7f0c1ab50974f574fddf4f28dc7b5117c2f9b6b6a732c49458d728fdee33d59e25bb880317c2d5347f1793d2a39fc3bf4db1bc485a1fa84c8de8a2b626df81fdf8eae856b366f0aa0d531556e3be76d5a00c43d2813bd225da4767e9ccaec0f3c8e4fed1f3b8ce4bb137e21599d7a6453c44cb88b7adfa7f7c1ed557dcf9f7386f8c655b762b9377f334ac6fbd79b8dd06ec7119294938a072d97c98ee3498a25a1c4cf7f49deaa6bf8291e37ff0e98e18e70ff0f51a27f9a61b6fc74236bbc50cac4abd996c71b39e3bd001a4f0e0e3f93bfd948fb9811d963c21ea2721492363295d4bab82e0752b09c10bc92718ca302f637a6a51c260967134b1e3224200d50f901a53218013baec8c9bf6ef6b23eb24abe99b83824b9a17811129b14d0acbd062e38c77fd2045aa33507410699d71198829fd3420e675da3f27d7892730dfce464b8d6cf04d2db54b43c8d1e0ae9ca2e2d918c65bf5cf24d6f9b5f5084218b219b044c3e2f9b018fb61b9ce6a13bf434d7221cf592a5067f5037bb561efedc0a17542ca5827d4235b937ee06efc7d582f135c7c844bc20d8fce9785c6d51b4b0ce38aff700ef5f2fe86474e536d0ed7be9cbf83d44ea464dc1312073c49e887240ee74caca98065dab2dcbf9fbf9d2d5541c0699b89522de3ae0ec50e7bc3b813e6903c930f0f57ed725f6e64365b9926f91c1cf3e57551f9eb9fae7c59a36afc7fcfca00fb8b5ae5046728b965d7a9066660ff37671df870a64fad0c01025527e54c6d0cc6445648a3f0d7ea3f901d237ad603320e99d89d600db6b9b34f960b9d8d5c69bec9c99b2efcf239673f6c6bfcc717b0bb567fb4586824ab5fbbb657ec4e0e3b59d41f4cb275070ccb3cce68c1e309583ad1d915ea958f6c90cf48476435f604d842e43a99a23e75afa0aa09fb94ea16e61077da8273ffde66e765afe37a4d27929ed863738c0d5a67e25e1d8e1e5d254b555cdcca3507411b520da8b2548ecf8585877a75eab94c788eb40fdbbce1cb29c755bdb6acd3f80e4b0389cb6d54e18fbeff9da127c7a3146835d23d2fc8dc05e98cf0dca6f710bf52a8911a9606c3b267073578dc893c9540b35bf29af7c4a717fa21283b23edc61122679fd3d2b2d6a3edfa14973090063dffeab69fcd8ba202654170c439fb4e69ed68cefcb6795e175ae467872581eae3b31076ef50bc002ffe7a7e503ff30e76cf87bf1e482a6ba7e21bab47d347978366a0f26fd159d57156317664c211d89b9fb1f438e0299de5052989fbfe2cdda95771449955dd79b3810c1122ca6f557ee7f696688437439b5bbaa25453ad7a08c93fc7aad642f7b775d219689550731afb0f62510157d56351bd9598a01a015f9f7fc981aeb91fed7b8bf62a4ca83a392f2951a61509a04d23e93b971acf75667b17e648f19fa49c4dcd3527ee9cbe5f75195d3ca0d7d1f8e713372afa651f961145519e6b556817431a477f18d3251d64c1423e47a0440cf1adfee7dae28bf3676327086e5b0503879c09daa5ab54bf51e67af232dd9bfaf0d8a0de297057e78fe685ebef9ceeb010468315047e2555df33e041ef4c475b1503e2a70aa5cbb87c35e7be55b0486418896a5854d54aedaa4cec5f7b979e2cb9f9214e4e02a1f5be1988f86beec27682653740b5b27c74b5f5ffa10213a6424eb008045c31afc1eae3bead19408dc34fb423c700b368315fb58dd6e52f17160327472075608c4182bcf26ba93c28ae783b52240530e949a704b4c08586fb0427142d35a0fc49e4422bbe3cbcfb1a1727a65c3b7581b7db165f913470843e7c00c15a4282567f1d7d0337ba61eb2d2ed4b2483f6c16b72c3ec39adf6df1dbf092b90401cc9061d92d407e240a70689acaa859d1e0e92d8e7d32d07beafe1904a129c4d07db9138a918e1543cf38c727eacc7f98eee8c30079a97c8baea103f6e688220d529abfd8b0d1cdd8059663427c3d3e0694d0b6ed1f1c08ba712b54365e2d219ae95a124ad761ebbaeb1e99046e2abe5b499c6b8e5e8d153f71c9061c5aeaed5cc29f952f852be54f5d0343a5bdcd0148f76aa87e48a90106d884e870defafcf70f9837cfd152245f30bba06d487a8c0a324dfc2cf377f5d39547222dd802365151e3da41baec9d0a9dff397d103937f8a5f57a30dad9944273009776d2cafab0e8ef89801ade096876683bb34e1a29ef93f5707a2cdf543912374e7eeb6a4be8596d7657ac084548988dde567b88e351a906ca91037fe6932daabd8c83053f74a15550a9a5637bc21a8e9a67d1d750b26d3b1888a3efcab61aa130af3a22f779fe0e7ed445cb48e8e116b847112d083ae177b8249af20f14794aa355ef7b2419e81fc41d5046257715762fdcd26807c6463e19643052531e98861989dd0e08e7cba184fa74e47904db607a1662defff2dbe7f57562666cd49ba55e58a8a0740cedc22325b4306857b720e900fa485350cc5986e21bbeb2a0f6cfe75a6769c8da0cd343bb457c7060c257bea5930f43eb04cd578f37b98da01e4442882d193e932954b665149986ad8301c4e72af591fa645120e935a8b4ee978e7f3fdb953b9f502037f2371f4bfe753ae5c7b93e8f501943b61d5b61c8cbce9491066ba9be844df2ea0cbdc1bba38e48c2e532e040b5f5583166083797eb46580a9b282b19d208ec59968bdbaa2ca147cf056183616390b53abd97dfaab5d9bc064b00162ed4cb4251e56418161a84e2e56dfd494c040316ae415020c20f752f7ad1059738857f59c8abf24695235660ad04565ca7f6d08ea1fea4f17027a6df56609f84ec518d9ac0a6462f3e726bffe7db95e7a608dca3b04241bcead9830c57482e1be33cabdfa35e4306799dbf8fd4558425c512777761a2495bbbe1", 0x1000}, {&(0x7f0000001740)="198f816c058b9afcddba1c09eaa461e900552e6136fed1d2fe0e15a05f326b72a2e226eda0939b20f23b5a07e4a938fcc7b967a06dec4d4c2a6a2cf2e0469768bec9f08fe034f3857009f86c65ca0811a23fa3a16379c723c5e551042fa425be94af2c9129a47ed84b44129f0e53820c59b6521b", 0x74}, {&(0x7f00000017c0)="668575e014bc63f0c5ba70ad6cbbd0060ce7c5dd274342b71381d3e467d8da95d454644bab44c5426e69733dbded5a53bf54a5cbe2dc9d10964ba8564aa5c198e26b9abdfcafc4870fe8264dd6a5054e63e6c9ecd9513e5f26678da7bfcdc945be5a985644b8bd0f54d756ba018f28a1c100886634ff4fb3", 0x78}, {&(0x7f0000001840)="35e2297ac444d4b097251223d819b1648d0d90b3fc72d586c2609742a4dfd7f88e7447ed800f5f4327f1a58f02ba92a0ca3a4ef921f6872e766d57801c6c6dea3577bafa197d3cb0eefbfeb3919363308241ad41300892a7da8db538053cfcce0ddc94ad8c82bd2a96998aa90c903fbc7d37cab72f2d375f6cff8830680ce98a4127f57bc5680ef4f800379dd2c1e7eff2f16bcdff6b9ea4c0df8af748b77ff9fffd85ff862368498da8f6d8d4bd7f2a", 0xb0}], 0x7, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f0000000100)=0x4) setuid(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000180)={"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"}) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r5 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) [ 1483.756956] mkiss: ax0: crc mode is auto. [ 1483.850705] mkiss: ax0: crc mode is auto. 01:36:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 01:36:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) shmat(r1, &(0x7f0000ffb000/0x4000)=nil, 0x2000) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r2, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:36:22 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) setsockopt$inet6_int(r12, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 01:36:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x7, &(0x7f0000000100)={0x4, &(0x7f0000000000)=[{0x8001, 0xff, 0x2, 0x8}, {0x3, 0x6, 0x47, 0x1ff}, {0x6b, 0x7f, 0x7, 0x1}, {0x0, 0x7f, 0x0, 0x800}]}) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) [ 1485.794904] selinux_nlmsg_perm: 70 callbacks suppressed [ 1485.794917] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.815820] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.880887] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.906698] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.922221] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.936771] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.952423] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.966206] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.980321] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 [ 1485.994228] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14714 comm=syz-executor.5 01:36:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:23 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000000c0)={{0x8, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x3, 'dh\x00', 0xc, 0x2, 0x27}, {@loopback, 0x4e21, 0x1, 0x0, 0xffff, 0x81c}}, 0x44) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r4, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x1, 0x0) ioctl$KDADDIO(r3, 0x4b34, 0xffffffffffffe9eb) getsockname$inet6(r4, &(0x7f00000003c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) fanotify_mark(r5, 0x20, 0x8001000, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 01:36:23 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) setsockopt$inet6_int(r12, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) 01:36:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000140)={{0x4, 0x9, 0x9, 0x4, 0x8, 0x12}, 0xbe8}) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="14f791d3f951e3b5b6cd4473e6ac876b000000", @ANYRES16=r4, @ANYBLOB="57667cd312bf94f981484d5ff9d1ef0ae37c3f0dcddcc6cf3e943fcff5aaac671bcff311663e595e940e831d67631bb2d0fb7272b8f2d03baf058a1702a328afcdb9233ec415f9955d237bfbf37f2b920dc5fcaadd2eede217c7d1a8b89a7df10e271984a392522c"], 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$can_bcm(r7, &(0x7f0000000240)={&(0x7f0000000000), 0x10, &(0x7f0000000200)={&(0x7f00000000c0)={0x5, 0x2, 0x4, {0x0, 0x2710}, {}, {0x2, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x37, 0x1, 0x0, 0x0, "237bb44fe1c3ce05773c11e188fc6287b7aa8e1a8ed8068699af31939f6653894a946c110188f84eef435848205bea3aad87381af39253f771d78c374931771d"}}, 0x80}, 0x1, 0x0, 0x0, 0x1040}, 0x4000000) [ 1486.742168] mkiss: ax0: crc mode is auto. 01:36:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3fa", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 01:36:25 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x19\x00\x00\x00\x00\x86\x8af\xd2', 0x40200, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) r7 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r7, &(0x7f0000000180)={0x10002000}) r8 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x100) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x60000, 0x0) ioctl$GIO_FONTX(r9, 0x4b6b, &(0x7f00000002c0)=""/152) ioctl$RTC_RD_TIME(r8, 0x80247009, &(0x7f0000000100)) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:25 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r12 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r12, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000061, 0x0) 01:36:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) ptrace$getsig(0x4202, r1, 0x3, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0xe, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0xffff, 0x1, 0x8, 0x1ff}]}) 01:36:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf000085d6e0cc74ab174f00343a00"], 0x14}}, 0x0) 01:36:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x2a, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) 01:36:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKALIGNOFF(r5, 0x127a, &(0x7f0000000000)) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ftruncate(r1, 0xff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PIO_CMAP(r6, 0x4b71, &(0x7f00000001c0)={0x6, 0x7ff, 0x100000001, 0x3f, 0x3}) r7 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$IMGETDEVINFO(r7, 0x80044944, &(0x7f0000000140)={0x4}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x44336dbad9810fee}, 0x10) 01:36:26 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) socket$inet6(0xa, 0x3, 0x9) 01:36:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xcc, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x40000800) 01:36:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/184, 0xb8) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x0, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0xfff, 0x5}) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x0, 0x4}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:28 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x80000000, 0xfc, 0x13, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x809}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x5) 01:36:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf0b00000000000000050c0000"], 0x14}}, 0x0) 01:36:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) close(0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa5) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000200)={0x0, 0x0, 0x2080}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 01:36:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x9d, r1, 0x300, 0x0, 0x0, {}, [{{@nsim={{0x0, 0x1, 'netdevsim\x00'}, {0x0, 0x2, {'netdevsim', 0x0}}}}}, {{@nsim={{0x0, 0x1, 'netdevsim\x00'}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0x0, 0x3, 0x3}}}, {{@pci={{0x0, 0x1, 'pci\x00'}, {0x0, 0x2, '0000:00:10.0\x00'}}, {0x0, 0x3, 0x2}}}, {{@nsim={{0x0, 0x1, 'netdevsim\x00'}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0x0, 0x3, 0x3}}}, {{@pci={{0x0, 0x1, 'pci\x00'}, {0x0, 0x2, '0000:00:10.0\x00'}}, {0x0, 0x3, 0x3}}}, {{@pci={{0x0, 0x1, 'pci\x00'}, {0x0, 0x2, '0000:00:10.0\x00'}}, {0x0, 0x3, 0x2}}}]}, 0xc2}}, 0x0) [ 1491.932225] selinux_nlmsg_perm: 54 callbacks suppressed [ 1491.932238] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1491.963725] mkiss: ax0: crc mode is auto. [ 1491.967597] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.024075] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.059088] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.139900] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.205645] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.237147] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.252854] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.266545] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 [ 1492.280964] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14825 comm=syz-executor.5 01:36:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:29 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r9, 0xc034564b, &(0x7f0000000000)={0x1, 0x47524247, 0x6, 0x1ff, 0x0, @stepwise={{0x1f, 0x1}, {0xfffffff8, 0x2}, {0x3}}}) r10 = request_key(&(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r10) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r10, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)=@secondary='builtin_and_secondary_trusted\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getpeername$netlink(r13, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000100)) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0xe54fbd076799253f, 0x8, {0x0, 0x10}}, 0x20) 01:36:29 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000005, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x11, &(0x7f0000000040), 0x4) 01:36:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x100000001, 0x1, 0x4]}) 01:36:29 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2f2f) shutdown(r0, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x8d0c}], 0x1, 0x0, 0x9f93c0634a683951}, 0x100) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") 01:36:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f0000000000)) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000100)={0x6, 0x0, [{0x355, 0x0, 0x3ff}, {0x858, 0x0, 0x1000}, {0x339, 0x0, 0x7}, {0xa0d, 0x0, 0xffff}, {0xbc2, 0x0, 0x1f098bfc}, {0x38a, 0x0, 0x1}]}) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:29 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000378f151333691af38f75a2f913445430c868da0306e0fec3d208bfefd492d8a4da98a80f49dfbeaf6df80c31413e664ec84cf2ca2ed336374d58239e5ad4cf23e1d013417c9aeace596ac6ea1053940d563726609fae1068a3f4a2cb663d98f537a4c0a149de6ee20e56b94a4e17bf2b5af9a499024190ed76b6ed2d5610bd2047d4f0f4cd2ddc51de803f20a72178256fdf26e4a8e494e503de8af2b9e42302d59ff342b948a13b2e824f74ce89167638d468928d7b8e95ff457960c85cc84f370dc64e42de934c296c88dcaf6b9d85f56cc25e511c2a9b1da011841db2f12e732d", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r4, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r4, 0x8006}, 0x3af) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)) r7 = syz_open_pts(r6, 0x0) r8 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000005c0)="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", 0x1000, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r8, 0x1a, 0x40}, &(0x7f00000002c0)={'enc=', 'raw', ' hash=', {'sha3-224-ce\x00'}}, &(0x7f0000000340)="6f00043d58d7b4170dbd6581d25054182f16860932515aeb56e1", &(0x7f0000000380)="721db0f1e96d957168e5c313f57d6f40c1122fc4bffa274704ff0067f0efa2734f1ee37a29f4e3c7b1110c06a7c6559432de1e43ca5c40609d34f656f91132d1") ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) 01:36:29 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:29 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:29 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:32 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) socket$netlink(0x10, 0x3, 0x9) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r3, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x1) setuid(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f0000000140)={0x0, 0x1bc, r1, 0x0, r7, 0x0, 0x3, 0x5}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = dup2(r13, r0) ioctl$sock_inet_sctp_SIOCINQ(r14, 0x541b, &(0x7f0000000100)) r15 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x10500, 0x0) r16 = syz_open_pts(r15, 0x719a74dbcc8c204c) ioctl$TIOCSETD(r16, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = fcntl$dupfd(r18, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_RECSRC(r19, 0xc0044dff, &(0x7f0000000180)=0x7fffffff) 01:36:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") bind(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\r\xc2\x00\t\x00\x00\x00\x80\x00'}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@empty}, 0x20) 01:36:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x802, 0x0) write(r4, &(0x7f0000000140)="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", 0xfc) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/dlm_plock\x00', 0x800, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r6, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$BLKFRASET(r5, 0x1264, &(0x7f0000000340)=0x1) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r7, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="050c27bd7008ffdbdf2503000020"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x14, r8, 0x800, 0x70bd28, 0x25dfdbfc}, 0x14}}, 0x10) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r8, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2000c040) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r8, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x400}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r4}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40040}, 0x20000000) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r8, 0x20, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x184}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8001) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r9, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:32 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\r\xc2\x00\t\x00\x00\x00\x80\x00'}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="8723ec01c144381cea181db7dadc28aa", 0x0, 0x1}, 0x20) [ 1496.049812] mkiss: ax0: crc mode is auto. 01:36:32 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) preadv(r2, &(0x7f0000001fc0)=[{&(0x7f0000001f00)=""/97, 0x61}, {&(0x7f0000001f80)}], 0x2, 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000001f80)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) socketpair(0xb, 0x806, 0xc2, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r12, 0x0, r11) r13 = gettid() r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r15) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r17) r18 = getpid() r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r20) r21 = getgid() r22 = getpid() sched_setattr(r22, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r24) r25 = getgid() r26 = getpid() sched_setattr(r26, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r27 = geteuid() getgroups(0x1, &(0x7f0000002540)=[0xffffffffffffffff]) sendmsg$netlink(r4, &(0x7f0000002640)={&(0x7f0000002000)=@proc={0x10, 0x0, 0x25dfdbfe, 0x58000000}, 0xc, &(0x7f00000024c0)=[{&(0x7f0000002040)={0x110, 0x2b, 0x0, 0x70bd29, 0x25dfdbfd, "", [@generic="e1489e96c09554e4ce8044707f789e44e78947db3b15dafc62caa3cf5682a596f71c5119cbea667ae1303eb2f35eddad8a63dbd069c4c29dbf9e21886c6cc7e5f2ffb14cf73df80d018747a678a9091d2da15ddfda2c9e", @typed={0xc, 0x1, @str=',(*-\x00'}, @typed={0x8, 0x14, @ipv4=@local}, @generic="17109f8a5294f61904e3016569cf1e378bb83389b7ae21a311cf8055ec4930e78d5f063cf8655d2140d3420527f5298db87daf1aa9041cc5867727d3ebac7852ac89bad34c127a9f2588f8e5c898bffa81f39e8f9b1f9214ab067b61721bed56be4ac5837ed0b0c26a75a4817cd48174c65ca37e36c8b68870caee1e8a4fd352debb387392104a03b91c58aeacb3eb038b4b79f092"]}, 0x110}, {&(0x7f0000002180)={0x310, 0x40, 0x100, 0x70bd26, 0x25dfdbfe, "", [@nested={0x260, 0x14, [@typed={0x7c, 0x53, @binary="d12dceb0e771174e500c550ea0935dcdf13a86c98a5440360be7bc93f0f37b290d1740d8acbf7844e18f996dda0e60a2feea737474ec30a2c9cb4f142a3d179c9d443d3530201449f6d6440539f9c1f02472b5903d8f71b6a7410ac43138b2a31c70e02250642e716b0d9729d2aba72d07cf0c3afa265652"}, @generic="e23def35b0cda1aa6fb4", @typed={0x8, 0x6f, @uid=r6}, @typed={0x8, 0x7c, @ipv4=@multicast1}, @typed={0xc8, 0x5d, @binary="858c9fa19d3d6cb60e751e35a814cbf451b70d9c799fe1a74a718bc10c858c7c96afc454cd136b3bb5d852a1bac0e22878e79c356b4b8863843f5e697149dbb8709063960d9cee15ea8bdfcde414bdb88d6e58cf424373c3bfb36b7eb57f3c9d9e64e094a392dee46cc08b99d90e6e5567b58d8330d61a552d20cebc8a54c3605843b66e263356d45bcbf3cfa7f5ff27bdef2efe26c0f18635d8c6c4cd03ff0967de4655e58cce1db8f9c06148430d7164ebd087c9616d6ef22b6817e5b40e6ab346"}, @typed={0x8, 0x7d, @fd}, @generic="d666d5d3dacc19c1c4e533b679c115926a46e2852ca78799f3356c0cc80db8c0c7f02911b61e65b90eda5d96095bd67e4d76a2d1b4f8b9046fb7279cab6339fa1d3d66f02c9bf56021e925156759c2272a53956ac8264de54cb91b3e8c72928d0009e0b3f0f9c01778e7baa2d5446def5b79f86fc0835d2acdbbfda23b1fbfa8cf73c81d56258f5a5a1ca21f3854dfcfce8cbe15509acbab7b3a3de71e3c0e29caabe657a042a174f4803f2bfece20cdd33d445dfa02c8effbd927a1c6585fc2759bbe67fa433f08c9e79748e0fa983a358b0ae391137707c2928a848be72e1959ce230f68db2266643772cf222745e8b1dbddf03e05"]}, @generic="9c8102000c5ecc56d5594ecfbf7334ee80ef9c5351a5d4f7fa979dede5eb866e0dc834040c0840d10073393c53755e8e2a8dbea3b0c868c14045fface3cc6cf591f9e05f9baa840569765bcbdfa780766bbfc5d8f6175525ee845b843f5b733dc6247d3f4fc82e0ac77786d699c2f040f7c69767615f7907646a422b3ec06a1bd42dd49efbc81deabb45e06a0c58054265b8aa96fea54b477111058a0d"]}, 0x310}], 0x2, &(0x7f0000002580)=[@rights={{0x28, 0x1, 0x1, [r7, r2, r10, r12, r3, r1]}}, @cred={{0x1c, 0x1, 0x2, {r13, r15, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @cred={{0x1c, 0x1, 0x2, {r22, r24, r25}}}, @cred={{0x1c, 0x1, 0x2, {r26, r27, r28}}}], 0xa8, 0x18}, 0x21) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000700)='trusted.overlay.origin\x00', &(0x7f0000000740)='y\x00', 0x2, 0x0) setuid(r29) r30 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r30, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x200, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff}) r31 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) ioctl$KDSETKEYCODE(r31, 0x4b4d, &(0x7f0000000100)={0xffffffff, 0x4}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r33, 0x0, r32) getsockopt$bt_hci(r32, 0x0, 0x1, &(0x7f0000001e40)=""/65, &(0x7f0000001ec0)=0x41) r34 = syz_open_pts(r30, 0x0) ioctl$TIOCSETD(r34, 0x5423, &(0x7f00000000c0)=0x5) r35 = socket$inet6(0xa, 0x3, 0x9) sendmmsg$nfc_llcp(r31, &(0x7f0000001d80)=[{&(0x7f0000000780)={0x27, 0x0, 0x1, 0x1, 0x81, 0x6, "b286ccc026897a44000cc7cd29207d8fc9577caaa56993226e65cba2b162f8a69630c090b98b0608575e9e70d25e81cbd5feb7d789e36318e7eb0cda32fdc3", 0x15}, 0x60, &(0x7f0000001800)=[{&(0x7f0000000800)="5e5e3d66d71fcbcb7a94a781d7c896f7dba645ca34a5cdb5096a2971a3911cff554b32caaad6b71f56f1aba52407d21fa01281d4a5a14fb556ed2d53443d3e0e023a78af7ec1725f40713c7439fbe6ec0ebbef2ebd754ee1567662d4b31b1d24d252357a9554d0b22cf8b4b8b701f346b05b4493f49846c01b09ec5dbfa12fa065c208a47416a5a18de3d6d8ccc1c386b34224ff27630faa13fd2aa7f053ae672395bfc332b7ee6deb46db369362824f59f08b821f8289f2e7d7d2dba4f1efa8607aad4c25b37a765ba3307c8ef66d8a3d3ac59c93ea3b7437fba0d85afbb2b9260e781c70e035026221a0cc3e1d303cb8d57f8944f6676aa85078c61e31398f94d30b9bfc88a0af80eee189e92eae4a4e5b8bc9c993a7c43036b2e0d0b06b047019081eef6dd1035223623446e33897e3d6cbaed97ec10b8d3a0a1ddd4e97882ad5472bb563a3bd34e78db44329544a5722cd5f16023d6aca9f8c939b965c045615336e1ff3f6539d7d4c51cb5de6a281246504ade8cb6b6941c8aa7c6facd70811e9d99d58a01b351a2a3f9fb64d67fc297468b78cb7327d5634314502a0ffe9de609f7b021ba98262695365c3e0f29082a7481e1ff73b944bd21db6a8017e70ed4e768c71d84f69fa9877d5321663a15c06317f646a187bf345e93301e5ba6f480a8a3a53b9eb07b1459006ab5d77f665d2481e4ae53ef7e89786920d9f91a2ff59944935d00dde1fd8b8326e5cdb33e6579d76ae0f6c6fa6775ccee93a7518787c095993ea246fd59f46033e1537a7217c01c5869d91930baf693d9d41d608b5344c7aae7c79e3171e6e36c439a4625cd30af45f61bd7acffe18abea3bb2a99488a47ee2ceb7fe7221635b318d37ab9cdf6814eca9ffbec7eff0e2e75d3bedb4ee0fdb6507225c15e6ecb14f8f4dea8ae58e7aed0df708626e6f7cddc54fa175d9f22929ebf7a4b9cb6d2d2cefaebbd80c1e14c9e4711fe5371c6e82e7b345c5fd3c9defd223334903891eaaefb1dab481430fd231f4585557581805d37c25aa017b472506f8fc51cc11abf68798fd944731ed49fecce8325936e3b412810db52805000db7d185d31e2be9145cf9822d817816d228b7e4b0fa7daa2116bd55e0327c50f1256b109f2206533b7478b0de1510f39407221f0fadf941b5f83b46203eede2fa8900b334d7ed866ddafaab883e7842e11825c95bdd3ca06f54cd776ef8cf93940fe1ac5c58e7465935890e345e523725a7ffedb153f113c736fd51b4bbcfd6e5f0fb2321fb35d31b7f4012b963c78e9c71955c6733c43b48d7b92232b69bf11eab42de9616b199d0281c726ed4f0f56693b697304d6604893145c3ef472c110b1d82ef6c36027a542469d7aacaab25695a3b65fbf37ff9cb82f8c2c38d1e9bb0ed660e8395f70f656dd0a69a12b807ff57844e308212144bf670775d33c23409f3802f5285bef9c4a7a304b4fe4624f8484c1c57f0d5d4ea93cce7d1a40eeaef2191b27d27d0b0c185b81a5c12b2e0bb09a05f5589560738f6e3c0ba684f63ad800fd365a0b3a59f2deea019695c38c83981e84bba69fa26ff7cf9041c87ae13eff644a2140faafc4b87b3ce0c6f7da3017f8824b826d181cf4d028a3eb7e5224a16d58df7562f29ffdd1fceb5805573778406d28a39d314f188f54605dd750b1654ac7ad6698974ec3a15f53daafa53db2512dcafc29bd482d1b1fa1352d2c41e9128b894a89791c1dce1a3575c19ba0adc49de5c19ead790121dc5b9a5102d8bb7514ce8a4ce88186c83a852080ca9a7f6c97df211d5d5b50e457f8d3ce1f3f7fc3d199eb03e03fab249837b478c197b1365676ef440e178ec6901f19c36f61c7b951fe10f7fc39b6d816814b3e11ce37ae70ad640d6843daa621bd75ad7e7b405f12b67344d8fd1f37708ec5699617a69412d9b8368b8203aa4c91e696af099bf540776a37e562082aa7b7d335ad6cad3a63f1fbf31c1baa168e64a5d60a30e111fab2a0c6245f97f2b179a314ced4469268287390c286445fe5ebb977bdf742bb8debf11a7ad0f9d1034bf48bf8e30dfb089b776d9de4264a80ec5d03f0a3487816ac4f51cd05d9006104d4b787ac40b427ca9a870ce8f13909c722d420ab62efd451330346a17a3cb818d474281c2e81f841023eda6423b9f39434426b7eb858cdf2e8be1fdf2277d197082a375a98e2c8b7fa23a6f48bea191b08d52aa9b6a809c69e949654b4f9633ac170590328177899fdada02bb5e310f87af63ce83f2fd7c01e6a54354e34475d3df592f6b0236743d7b8043004851aacb215f8ce2a9bbc7ec9548105b24eea3104362b23cb61745dc4a8e122307534f8967227b677d51ce0fcf80b679d4fd7b992b186a436e67a80132455829ba3a9466fedeccfc18cfc6362cd83917055f67bbf35fb5605c767348ba38a62a08a22cbc6d5bae857482c49962732465f533b47d43734189bcab3a919577ec1e5f1b44c7336dc29199983ad3d9d16facaee1461dc8a1b98ebc00887ee64526f20de9d15e035258d66f62f6ee9a98dae05831dce33e9702dcfe623ba2ca6064cfa422906b4347c107d247c1331733fb4b2961f9eeca485d86e548dcb554c0d978691550d9bd44914884cd602e6e63f36e3f07841793580ac54c6ff08dd7bc5b519a63d1b1b5d3502ba91cd4257b7e7af64accccf2583adaa047102abb2d76c0fdc426e040463a7e2ed2d6f8555c0e297fa47068026a8305f54f87280ee553be61dbefd5d57012cd6f3599cfdd4fc2164ca1c226ea005f58363d466a4a9fe4f873bbcf7ed125e4f975b563ed16c6115829d5831f5f164426822cb3a283cb232ec5cedc7e12dde68253a867d646f4db716b4977b5761420b22cb71c2073df0136b5aa0d9ddd99a715e5469ac09a259454c30241a9191d91823886f81a6cc778da3f8966f6ac2348cc8a5e692731be9bbdf5d6b470dce4bd0ccd494ff169a4e5c20fdbc6d32630d4fe8c842a5c0ce9bfd87c43eaa3981b3f07796808de841b14a52e0e784ac83e4a4490522c9e7c6fd4af83cfb4d354542b7cdf58349b765febc73897dc7d5a4502d54520e37a130493c10f94f8d3f745d76dffa65c76d3305eca88b1b3f717653906f8f3cb880fb428a8a2a550c3b52ea07dcfa6aad74a5e93c35f9d4c8d474a8d4102f10432ff92af401c625fdfc133d720b08cfb4037a5d835607d240d868292aba3d3fac37104829c02c34975a92b472af0ba5169098b4d052ba6dedeb355e01ccafb7e534c4b18183c1411c8913d4e08725cb9e37bd2ccbf5c652ffd1775cc17f7ba4a927ce0ecded0723ee4392064d2883699fabca8aab91d101b7ca349a64ea5668422ca3a139171f021e49bc8ea62bb8c0da943520fb1e5661448a6eb741576dc5ef6781cf6f5fe5fea5c8960412743f38dce68dcd3a454a66020169c15324f261967b2a95b36f19a90ca47a3a389bb8dfd99cfd4de0b2a25e4d1903cd720f1cd068ae43723cd098f36cb8b7070ff5367e3595fcb0f7a4205770279887fcb26eb7acf53c9d9890d2c6a3ee581252d89131cc05f7653ad054343a025fcb106f38685509c45ce58d9d0e526780a8888fb2afc08a8c5c2e378f2981ee6bcf8b7608a8a2fb8cca299a6eeccc8de13ad165a1065c9f231438cd40b92e2ed7537c3bdd649d0aa8c2bf594e0848f145b9c4e43ab5cce5da00eb2acacf050c220a3b77bf00de0ef981a160395c69190c3fcd206c186f701cc71c93c7e8eff7d43ddcfa9564da7cfd7a6d3b426102e66386eac9b6ff6cbbef0f7357e6556977fd22ccb86ac1abf8c0499c97a08163c04d3a8e37b9e17820c986c6a12b76db7fa1ca12f0de5ea0a828eac5b4f15c87dedcf435088faab8ba6f9dd52db81dafe0ad5b501517f0560c9347a9349f6d9cb56a4055e245a87f02f3e911120e9a9c484e8576a4d6d8e2fc4f2386341fd163ae6fd69b1ad4ffc5981fb0f570a8dc8fd8cb211807bc6b30bbdd16e6489c9b64d4d8739c75e0a62d48d4b8f0236f27b14136b55b0085f43655ca27160ef34eb5416c596e750b816817583c18b72b8ee0b11a60740223e6eced2df3c1075f6229a7b0a4a9472cc5a166c3d9d45bce17379e671e0c7cd8514d2431ae4addd4e461f3dcb4b502b6339c87a9b960338e42427a3324f6567e60172abaacec7a8bc498fb7e3a4b5011fa7d76837beb7d99585b986aa224e4900c0e2bd1f2ade5b349c097fe47e5dbc1a8f2d5c924091c2645d6e6861e4ba2ce7f123a89ceedbb2c5de635f4bfdf8f4df4d6e3c9dd8ce39a916ef686cd654843dc23a9a8a7482abb0b3f168277112f74a065d04a3fe638825cfa777bd1d5a7eb3dae190a5c819e64059536dfdb164e75f2013d6cc4bb16a00cb2fd6cc5260b3d8dab59e66d49c2ea13161963898dfc3241fa2dcaf4f76a432d41151c8cc896ed509b3c744db9b5c57df6716992e026a1e47179494c2b5030e15095673c2aa1efcfb13e20ed6443389aa518d94883bd8334e070487a7b9b970313494748f09267533e355a5912be3bd73388240819310c4b45f12b95c7b74980d0bb05b9b1fa60eff966f824dc14c9f27167d827c280fcff7c2ae2fe8675ce933194c5db428b309c25e050266f5b8d292c4a7d60e802922b2af149fd26d40095c5e368b1683a50f9eda72d66653d74fe51bc3114f52f39cc0ced307f4873a1967ae0d09567ef8e25489ecb0fe4d7851a3bc76bb0da5552a3f80da6ef7a49bc03f642923fe02e4edbfe947516095a843cc22d3db2a77bb3ac909f33078f586d865b54aeea2e64c5154e39515129074ba6dba0eba7979d96b2f8aaed79ce62925546b19271aa9c91e2904e803f94b7eb95c62908f3b20b580d1895e71110d37af9dbdbce245919a1b98aaaa75e796eda4c547f92a5cdfc23cf6a966173103e3d2c985df8980a3d17f93873e4fcad27196338915faef0dec00256bd30dc80aa3bf190e885e4949ae24a23adc93ddc6b5a30871e598ade08becd23cf99b059fd9ddf936f7f73c76662a955e5ae2677a2a8a981441da4118a24ce60611308d3fe85d096cc5e55f9852b47f7eeefde54fbbd622e7928c661299880fb01c2c42c0b1d6c00b1e5b75398c464ee71dc949aa6a79249faf261cf3e1315cfb862020993fbf32348eaa30afb57e75649468b224a539cacdddbb009a3053af588693789bb64361e4772b15f82db34dc02f77f082278379c269cb8c0209e93100d134b4634c4ae8322fe3f0eff8903670f0330e40ae681134f655c108b6b9be755afaec8cc8c2b5160fc5b4cbb5cbf0bdee42b38e5bc339e01f0d8bebc11896281c0105cee087a089fcd7a50d0ae813087aaa51fc934e11a6a21199217dfc2ca6c1844d9636e6d79ce574a2d355bfd028e28bc7e95c4d167b76798a4d3b1b89a818b75edb133795496fddfae727a1e356895ff2dadf107486ee410e6f674a772daed7644238eeef6f4446b51a1c5be614b38222fa92449b67e12cdc9e5c3ff56287f0368ab3c7d75b2ac6aac102800ccfd1ec73f8e925daf645ddfc244b764d486c89efed3d0de7d8d7333af97c85dd9b0885e1f1ed5900d89f84d16a226c34272e271b8b4366e7a3e668ce70efc8d3795131ca5da6186cbc0d595aab2ac29a29a068289419141e5b22983b0e5a0a9c548a6d8b6146357cc4d0893e8e36e5569f948a29dcb4b02f520839b75509eb1c7f2b154d84873cea301938f85b8edb71727a8bb888ab310cce89e8a2333c15a7d61ca91a3a3bfb2dd1c7425464104b69363f138eabbb26", 0x1000}], 0x1, &(0x7f0000001840)={0x88, 0x0, 0x8b3, "47c0ab435febe6e84c0db663516a969af81efce4388bbc940a8554c18b9d1ae54160d408f2274006ef98e0b0b821fcd78b7b935e1ea342c9f19d5044ee6a61144cdb19356cde4c0de8871eff5f2c5c55f2919fdca5764fd8cbf53b4651d8aac360f57a653e46d4828b35f9c84a4593c8ad65"}, 0x88, 0x20080}, {&(0x7f0000001900)={0x27, 0x1, 0x8000, 0x6, 0x5, 0x7f, "e3e2fb1723336c610a6323e7030841a4a71af4efe6826c4283a58516840d50602d73981e953bc03e3bebedb4e0789ace706f19130928f0ebc44b61a588cb67", 0x3d}, 0x60, &(0x7f0000001b80)=[{&(0x7f0000001980)="01d10935e2fcf1123d977c0d0a3001095879f2a2ea6ef407f20290e2de7463f7becafdb16a5712d0bd83e96df5cefc548761b54dfde4ab9fc00d7d5908b9c0b046d80e22d400bdde4549aac67c00d6177a6b77a17e49ee07f20ce96bde5e529ab507a2ca7e98aa954bf7305305eef03f107ef23a0b6cca7880e1ea14de9950f8a313ab931199b3d03ac11a", 0x8b}, {&(0x7f0000001a40)="68a0e87bea45d8d76315474b10b31a9da6d3db412702854ddcc3305c74c35e30af1b95460e6ab42ef6cf93d864625486", 0x30}, {&(0x7f0000001a80)="b7813fcbdcb6bcba2f511daff13ea56ca9c9f4f69ba480ba78c051a5d876abd3ad321050b747d05900ec052b8811b53d1f7e3d1fb33a2d7d726db552b386eeebcace1de47b0f18889a5f584b63894f156e5c6a7c1879b5e2c7d60a44ef86a09de3a2cf569b9d470f2bb9e5ecc991e223d4188138a74142e9f67b44fbd0406ece12193ef92ff17a28a9b0b0961e6097ccf0f249", 0x93}, {&(0x7f0000001b40)="8ea5889d0fd7c86a0d578efa225da51ce30be9284537ad011b929891723dc55955d9aae2173c51fba7a362e889d4", 0x2e}], 0x4, 0x0, 0x0, 0x8000}, {&(0x7f0000001bc0)={0x27, 0x1, 0x0, 0xf, 0x7, 0x0, "d13021f976259f3b27386eb7ef5cbca301c3b3cf371f02162cc89c4b7fb815b8bcde9a5b5c9ca8774d6b50b0ea885af8003594bb7b7ddff2dab5803e579ceb", 0x2f}, 0x60, &(0x7f0000001c80)=[{&(0x7f0000001c40)="779e0f24336da5c949424dc8940cb722f0f22f840e3565a4", 0x18}], 0x1, &(0x7f0000001cc0)={0xc0, 0x119, 0x0, "165a56f31e6c30c01ca21457de8030b695f39e729a089d91a96268d526d5464fe26c262295a73fd8d1c2864931e59051ac0ee59ccb06b99aa5c0e69049fbca4f9617d9c217d7e638a6820958b0e56e80a34bd5db1275616899657cc85185c536313fd184f2645c366a43b4c8421b300b6b44025dd0cdb1cfa6f1feba942b21c16874ed29f040afc186c84b0e2f7ed78b1f4077964c2d4c8b181ec6d978a2c5b6fc0bf23c51d95608db"}, 0xc0, 0x2000c004}], 0x3, 0x0) recvmmsg(r35, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r35, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r35, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r35, &(0x7f00000092c0), 0x4ff, 0x0) r36 = dup3(r35, 0xffffffffffffffff, 0x80000) r37 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r36, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2021001a}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x6c, r37, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x81}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x388fd03a}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffc}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x20}}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24088002}, 0x4800) r38 = dup3(r30, 0xffffffffffffffff, 0x100000) r39 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r31, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x880000}, 0xc, &(0x7f0000000680)={&(0x7f0000000400)={0x244, r39, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff21}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc3}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40000000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3d97a707}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6397e8fa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd72}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2d3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000000}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x1bd3e05f1d46484e}, 0x4084040) ioctl$SG_GET_ACCESS_COUNT(r38, 0x2289, &(0x7f0000000140)) 01:36:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffe26, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c0000001400fd0900edeffffedbdf260a00fa8e1800000014000100fe880000f011e3009f0000000000000000f6dc952332d184c4aa2a0071c895dd12aa3cdf56d059f2e80ee2b3c2bd175a84ac4acc1170b6ed1c006550bd6311f573105c42fdca889cabb68d711739bc1819af9aa5dccee1791fbbc1c1889d43884266dda9f64fc8d91279fe2eb43719168af7cf2d1b57331afc3bf0c76afac4c82b8f703ac6de58ed429b813f845621a3af0031dc027212c48c0a759048c5866821b3aa68b3cd99c2d229dc1757f8f57650e91877421437843d06000000000000003c378b97dc7ca71c24ce3ad1b13ad0b6800cd4c388c1183b3f165eb644359efec85ead1fdfe898fdfe2a948e0c99c60150989ebb218f557508bfad6f6edfff135162966fea38735d0ad776a47ef3b8f62fbdcc36815600"/318], 0x2c}}, 0x0) r1 = socket(0x1000000010, 0x80003, 0x0) sendmmsg$alg(r1, &(0x7f0000000100), 0x4924924924926ed, 0x0) 01:36:32 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) close(r5) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:36:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:35 executing program 2: unshare(0x6c060000) socket(0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000380)={'lo\x00', @ifru_data=&(0x7f0000000340)="f2343a1852a453f38b9273be89d42ceb8a8f94de0ee5495c71c6d5a1db3e7648"}) syz_genetlink_get_family_id$nbd(0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 01:36:35 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000001c0)=0x9) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r7, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000080)={0x0, 0x18a, &(0x7f0000000000)={&(0x7f0000000200)={0x14, r7, 0x3ecb7b9d36d9df7d}, 0x3bd}}, 0x40000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) r10 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffff800, 0x180) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r10, 0xc018620c, &(0x7f0000000180)={0x2}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r12, 0x0, r11) write(r12, &(0x7f00000002c0)="ecec8dd5c50072bcb32fe3d896b51792b3a91f3f67e199bffe269f1b4ea1bf2a493e757a5f810c0adb88bfd14aa7e901dcdb2cf7f8848f8effdac7283367f6eaecd3fba8ffd1adbdf7d96c36e4b7d585e81c753cbbe128be781451ff505073942b9163bef04b232bda9d366e108025b47574c129e9f0db82b7f19fc1c74988f0bcad5d901afd2c1223e27a381f5d00c5574f7c5e41bbcada931a0fead94339b7c75be25cc58e85daa6f1cc9b5b46293b9f2244c259a6a92098", 0xb9) 01:36:35 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x60002) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) pipe2$9p(&(0x7f0000000000), 0x88000) 01:36:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getrusage(0x0, &(0x7f0000000100)) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='\x94\x00\x18\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1499.116454] @: renamed from lo [ 1499.122568] IPVS: ftp: loaded support on port[0] = 21 01:36:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d, 0x0, 0xfffffffc}, 0x14}}, 0x40) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x88e80, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x83, "5be83ca454858b3d47b81aa357e6d797520a00808845d062a3e43d1b8e9dfed04759561bd8ca35fedf960d3965e04279b45acaeed4d3989085784263c2ad720b3fb55ea6eac647b8ed72dae3135926ae3b758c65946b86624bf3703f18284a6cbc11893bbba344351000486cddcf2a8248d3e58d13ae53dca487cc267c679e548ff96f"}, &(0x7f0000000180)=0x8b) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r3, 0xfffffff7}, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000240)={0x200, {{0x2, 0x4e24, @multicast1}}}, 0x88) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000300)={0x0, 0x3, 0x2, 0x10001, &(0x7f00000003c0)=[{}, {}, {}]}) 01:36:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) r11 = fcntl$dupfd(0xffffffffffffffff, 0x605, r6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x0, 0x9, 0x1, 0x800}}) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_VL_CLR(r4, 0x7014) r5 = fcntl$dupfd(r1, 0x0, r0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x5b}) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x448, 0x230, 0x230, 0x360, 0x360, 0x360, 0x360, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x8e, 0x7, 0x2}}}, {{@uncond, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "c268382343b1c98a2c700fe44e98da2c902c4bb6b18c54a321e7a2d02cc1"}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x498) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x605, r6) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:36 executing program 4: ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000340)={0x0, 0x4e2, 0x9, 0xcd, &(0x7f00000003c0)=""/205, 0x67, &(0x7f00000002c0)=""/103, 0x74, &(0x7f00000004c0)=""/116}) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000040)={@empty, @initdev, @dev}, &(0x7f0000000580)=0xc) r4 = accept4$ax25(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @default}, [@null, @default, @remote, @rose, @rose, @remote, @remote, @netrom]}, &(0x7f0000000000)=0x48, 0x0) ioctl$sock_ax25_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8, [@bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0xd8, r5, 0x400, 0x1, 0x0, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00\x02\x000.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'N\x00\x00\x0f\x00\x00\x00\xdf\x00', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4004}, 0x40000) [ 1499.510632] selinux_nlmsg_perm: 23 callbacks suppressed [ 1499.510646] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.540606] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.581582] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.608714] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.638829] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.668169] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.697188] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.727141] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.754808] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1499.784106] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15009 comm=syz-executor.5 [ 1500.121241] IPVS: ftp: loaded support on port[0] = 21 01:36:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xdf) setuid(r4) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r8, 0x5387, &(0x7f0000000140)) pipe2(&(0x7f0000000100), 0x80000) r9 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES64], @ANYRES16=r1, @ANYBLOB="7ddf000000942c0e0d08b05421b15e00fae96a1e3f00000000000500007e78053ee4e85322a8434c6ca95fb1ab2e39c05bac75ccb9f4fd488c36b43423200e7e7bfda1d0fe1f4ac23a192056d5ac899d5807dae5a587d83703f2a2a1b7d742"], 0x3}}, 0x0) 01:36:38 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RCREATE(r10, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x64, 0x3, 0x6}, 0x80000000}}, 0x18) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="2492e8c8dda5a9dc28e99d6b4de7cda1f225da510b9d8243ce706028b17821f4124ef69498ec2617f46234b619a4d638360a5960169ef61bdb78f9c9d3bc96087af0cd8be313f690265bd4b3f54e7896a30f9e0b438006844379f6a1ce814b5b6278d005d5300aeeb45e22361be6dbabc687f997b1654a2bded85d3eaa67dcba907ce1141d45239947e3557c7d480c275236", 0x92, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f0000000200)='cgroup\x00', &(0x7f00000002c0)) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x100, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000340)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000380)={0x0, 0x0, 0xfffffffffffffffe}) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f00000003c0)={r6, r7, 0xa3}) 01:36:38 executing program 2: 01:36:38 executing program 2: 01:36:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f00000013c0)) fcntl$dupfd(r3, 0x0, r2) pwrite64(r3, &(0x7f00000003c0)="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", 0x1000, 0x2f) [ 1502.109058] mkiss: ax0: crc mode is auto. 01:36:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r3, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x21, &(0x7f0000000040)=0x3, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) r5 = accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10, 0x40800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="83e5ffff", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r6, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000180)={r6, 0x9, "151d52d1928bb670b6"}, &(0x7f00000001c0)=0x11) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000200)={r7, 0x1}, 0x8) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000000)=0x1) r8 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f00000000c0)=0x5) 01:36:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x261) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x0, 0x8, 0xe4c1, 0x0, 0x2}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) fsetxattr(r9, &(0x7f0000000000)=@known='trusted.syz\x00', &(0x7f0000000100)='\x00', 0x1, 0x1) 01:36:38 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:38 executing program 2: [ 1502.431533] mkiss: ax0: crc mode is auto. [ 1502.592563] mkiss: ax0: crc mode is auto. 01:36:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x100081) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:36:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='\x12\x8e\xba@SMt\xc7') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:41 executing program 2: 01:36:41 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x80101) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:41 executing program 2: [ 1505.181526] selinux_nlmsg_perm: 38 callbacks suppressed [ 1505.181539] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 01:36:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RLERROR(r2, &(0x7f0000000000)={0x22, 0x7, 0x2, {0x19, '\x94selinuxposix_acl_access{'}}, 0x22) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) fcntl$getown(r2, 0x9) 01:36:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 01:36:41 executing program 2: [ 1505.271594] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 01:36:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3ff, 0xa4840) r3 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x1000000, 0x2, 0xbad3fc0971f6927f, &(0x7f0000ffc000/0x4000)=nil}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000100)={r4}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f00000000c0)={r4}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000140)={r4, &(0x7f00000002c0)=""/236}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000000c0)={r4, 0x2}) [ 1505.376694] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 [ 1505.418658] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 01:36:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r2, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r3 = accept(r2, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0xfffffffffffffcda) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8983, &(0x7f0000000200)={0x7, 'netpci0\x00', {0x7f}, 0x400}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SIOCRSGL2CALL(r8, 0x89e5, &(0x7f00000002c0)) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) 01:36:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000000)={0xa5, &(0x7f0000000100)=""/165}) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:42 executing program 2: r0 = socket(0x10, 0x802, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) listen(r1, 0x0) r3 = epoll_create1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000007ffc), 0x2f5) write(r0, &(0x7f00000000c0), 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x30000011}) [ 1505.514782] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 01:36:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_FREQUENCY(r5, 0x402c5639, &(0x7f0000000080)={0x1, 0x2, 0x1}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_CROP(r12, 0xc038563c, &(0x7f0000000100)={0x0, 0x0, {0x3, 0x3, 0x9a4, 0x1000}}) [ 1505.597647] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 [ 1505.636774] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 [ 1505.656577] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 [ 1505.698312] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 01:36:42 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1505.775598] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15107 comm=syz-executor.5 01:36:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:36:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") 01:36:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x10}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) r4 = syz_open_pts(r2, 0x101000) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fchmodat(r7, &(0x7f0000000100)='./file0\x00', 0x30) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) 01:36:44 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="0b2c17e6be8e3f820873a9d75027", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) 01:36:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x4, &(0x7f0000000140)) 01:36:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDSETMODE(r4, 0x4b3a, 0x5) r5 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8000, 0x200) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r5, 0x111, 0x4, 0x0, 0x4) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf00000000000000f5240000f2"], 0x3}}, 0x28040079) 01:36:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:36:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000075a7d88e045c55d5e8557e8ca6be758ceb65b0b55c8bf6c72918b65e4aa25d2ebc2bbe374ca86b845d7b060f1be49d", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r7, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000100)={r7, 0xffffffff}, &(0x7f0000000140)=0x8) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r8 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f00000000c0)=0x5) 01:36:44 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000100)=@ethtool_rxnfc={0x24, 0x0, 0x0, {0x0, @ah_ip4_spec={@rand_addr, @multicast2}, {0x0, @dev}, @esp_ip6_spec={@empty, @empty}, {0x0, @broadcast}}}}) 01:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$audion(&(0x7f0000000140)='/deudio#\x00', 0x7f, 0x223200) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000180)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x0) getsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) 01:36:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002002566f2995e2aed4f4201059b96977a0855ef7eacadc2890fffe", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) 01:36:47 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x9203206f62714142, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 01:36:47 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r1, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x10000) r2 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r2, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x23, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = fcntl$dupfd(r0, 0x0, r3) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:47 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ded000400000000000005000000"], 0x14}}, 0x0) [ 1511.330268] selinux_nlmsg_perm: 54 callbacks suppressed [ 1511.330278] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 01:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = msgget$private(0x0, 0x10) msgsnd(r3, &(0x7f0000000100)={0x0, "bc0777d0ebd20dd148263d87e25447a055ae0cc1dfbe82168271e105135a3f8f214722efc1de3e7bebdc8f5aa2418cddf2617ae6017400a96a4e3fedb708ab2d552dccccb477834d40e7f194cc018c00f02893ef106877"}, 0x5f, 0x1000) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) [ 1511.381032] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 [ 1511.411514] hfsplus: session requires an argument [ 1511.458680] hfsplus: unable to parse mount options [ 1511.481076] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 01:36:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf0000000000000000050000004a62be34e43266634a93db9bd156e080a9d5880ae76a4916b63398c7b17a24feff590fddea07134f157d32ef2fe46408279b0c63cb8c5e799e7fb175ef005902d84c7af040a4f1855bd54811a5952b224ad859a0924d15ae56dc799bd5e6fe5a54cbc963a82c709dc4c654ca3b7d313b5a7dc1c04a77dadebed8ec759e9e2bb9ce9e3b59382da716c0fc5114e0da3657c2105f0442d4fcd8d71c5047f61843f0acea220ded9280b4f696a58a322c0568c060f3d10100000067"], 0x14}}, 0x0) [ 1511.561812] hfsplus: session requires an argument [ 1511.590257] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 [ 1511.594080] hfsplus: unable to parse mount options 01:36:48 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r3) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x1ff, 0x0, &(0x7f00000012c0), 0x8000, &(0x7f00000002c0)=ANY=[@ANYBLOB="646f74732c636865636b3d72656c617865642c7065726d69745f01000000000000002c6f626a5f726f6c653d245d2c736d61636b6673666c6f6f723d2f6465762f70746d78002c686173682c736d61636b66737472ef0000007574653d766d6e6574302c66756e63377f6ed4486e9d35369da04a220b72e29588bd51e2c5f376eb32"]) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x282, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0x1, 0x4) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x280) socket(0x11, 0x0, 0x0) fsetxattr$security_capability(r5, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v2={0x2000000, [{0x8, 0xfffffffb}, {0x6, 0x81e8}]}, 0x14, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8e7, 0x0, 0x7, 0xff, 0x1, 0x0, 0x80}) r6 = syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1511.731736] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 01:36:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000000)) [ 1511.860793] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 [ 1511.945068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 [ 1511.965064] hfsplus: session requires an argument [ 1511.999006] hfsplus: unable to parse mount options [ 1512.057997] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 [ 1512.192851] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 [ 1512.235616] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15216 comm=syz-executor.5 01:36:50 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) sendto(r0, &(0x7f00000000c0)="1f766281cae1b06b86a4ec496ae84bdb87f06a16136d4a79a5d8b6985b64a06ac5a87aca979b54bb402d98ac75086dd32692118ae17642739cec3daf6bd89bf71c3ed4f0cfb05d7aafef2f3c18962b21b55267286a3b2850060c5706464f4208c8e2b5a09d3eb329878df686570d67df09841ab60059aa694ba05c3ea32740e920db836d0ce3a065699262875be79e", 0x8f, 0x842, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r3, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:50 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:50 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001300ad", 0x7}], 0x1) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) dup2(r0, r2) setuid(r1) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read$char_usb(r4, &(0x7f0000000100)=""/135, 0x87) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000000)={0x1, 0x4, 0x0, 0x0, 0xa, 0xa7, 0x7d, 0x0, 0x4, 0x0, 0xfff}) r9 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:36:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) r9 = socket$nl_route(0x10, 0x3, 0x0) splice(r8, 0x0, r9, 0x0, 0x1420000a77, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000300)={'team_slave_1\x00', @broadcast}) pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r10, &(0x7f0000000200)=""/250, 0x50c7e5e2) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r8, 0x8918, &(0x7f0000000580)={@loopback, 0x4e, r11}) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30004000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r7, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IFINDEX={0x8, 0xb, r11}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x24004010}, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1514.394841] hfsplus: session requires an argument [ 1514.416121] hfsplus: unable to parse mount options 01:36:51 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r1 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r1, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x311, 0x4}, 0xc) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x101000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) r10 = socket$kcm(0x29, 0x0, 0x0) r11 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r11, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r11, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r11, &(0x7f00000092c0), 0x4ff, 0x0) prctl$PR_GET_DUMPABLE(0x3) poll(&(0x7f0000000100)=[{r1, 0xc182}, {r4, 0x222}, {r5, 0x12c2}, {r6, 0x10}, {r7, 0x200}, {r9, 0x80}, {r10, 0x200}, {r11, 0x20c}], 0x8, 0x7f) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r0, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:36:51 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:36:51 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) r4 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) r5 = accept4$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 1514.585502] mkiss: ax0: crc mode is auto. 01:36:51 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) [ 1514.635620] hfsplus: session requires an argument [ 1514.665502] hfsplus: unable to parse mount options 01:36:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x58, &(0x7f0000000140)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, @in6={0xa, 0x4e24, 0x8000, @mcast1, 0x1}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e21, 0x5, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000380)={r7, 0x9c, &(0x7f00000002c0)=[@in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @multicast1}, 0x1}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e23, 0xfffffffb, @loopback, 0x1f}, @in6={0xa, 0x4e24, 0x3ff, @local, 0x10001}, @in6={0xa, 0x4e23, 0x6, @loopback, 0x6aa}, @in6={0xa, 0x4e24, 0x100, @loopback, 0x6962}]}, &(0x7f00000003c0)=0x10) 01:36:51 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:51 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:36:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f00000002c0)={0x1f8e8da89729f7ba, 0x0, 0x2080, {0x2, 0x3000, 0x1}, [], "052149b68f46f74ec078c880718c15b97ecf92e9c02f0ae2d98edf866730de444f603b429f1063651bd1eb2f7a414feb3afeecccfecd2f7aaf3ed90453a61486e7b753984096475191f1b703198fd8276b7e7cdca6bfd2a79696151a8b2724ce6503619dc6f29c2616c71098b1f4a7a1de830e6904bb4bc46735a4b5db6d7d56704527e421dab6a6329d81b05caacfe883ce899187a0915fc2bc8b4cb8f1c5fdc56cb485a51bea284497ebb0a2fd4763f0646dcbb45847d0430921dcf5769aa11c7280a6fc014cfbb26efa06146787bae67a47aad80266bd2fac0bd873c248414d2806a1794582af24459faee9fc4827896574c40d0a262c1687f9a34bb28aa3afe0758aba97c2d120e56a64c2492bd3361e9ec1cecf57d92f862b8c9f85f1cfc121316c48866318c23290eec020ec8fb4958790277c7f8f28f0ab7caace5bac256722b2a507daab7002bf818eb819be8653cee4332afe53aa1a31e916724b54b2582187141ae129342fb80cf52d922e4b725d93168605eb6b99732528f89b12a07a897115f06a2a569df9e4508409d1f4bd98bcda8c9343f0823b531ff52c3a9be0c9a8e72d61d9ff1b38e7946b53baeaa38eae482aac8dd43c82f0807658496010bd893ad48a6ebc88d911d09e5c0f4b2c41245506ae2bc772d054abdc25fe16ebdaeebdc0f2f18bf7d79bec179df27bb572b3d587a958fe2c59f30c362adbc92ce64ef61772008e0638a1a8351d78a26849d3b2297fe0effe06b3b832d5ff0b035bae78a069c7be996aad877c390888c6f24fc733464ee52e660ff982465a03f85a107a0edf7f38ca9d4aa0e303f5b723a081205a496459caa765e6a2221ee0d0095e2a2a79becb739ba3752c2bc9234441e2b61efdbab714b51f3cd371e18e87b4fca479ec20bd56c9ee6677e4d5108d46873f456a196930a24d8a640af0884856d85222de2434a78555e2f71c98b818bd7068bad4f76f1536c30fb939b8bd4b4054a0e450c354e5d534e5271836cd6f79c2458698f2a3613db47e4ef5cd55731162ff0bace0c948232cfe7ac5a9cda07c628e4f1fb5ae1743908cb214625f303a17cebfb0edefeadcfcf1549a1b4037f79aa63de8b60aafe22e1743d739ea230e45d4ff24324fe9051b1a3fedbb7952ad33b0df5d9973ca71de6fd0be87318f686c9549e36a9484dc4f0c42aacfbf77bc681aa03af506316ee8fd2a87b2d52dae5a18e22c6a4ac42f69ae1275583c7e92d82d8204a844f7ff3a2966fcedeb55b189691a37bfed48037540296226771618db792409151168d373bdc223093d323fec8f19f0db1c28b13005a4239143562c89035075883f66909cc72e4bcef0daa0d18b49e3092627212bf0a1e7842b1bdf56dba6d0bc5cc80afd2c8039b8b056e18fb2b0b0ef8f9d458e39881fe98aed2fecef924f9c63049c42212ab561899649648fef281fd1e6fed7fbe06dff06edde83427b4d842971db5c73499dfa2bfec1326f31aca43ee4c0b3cd745223662b47644b832aeca41f3db0f7403e03a754406bf4a3d1e9904b665ef50cc23a3da4423ef33ea1e196ed78e986361e74fca6c5b27f8da0c8fb3fd2161e1ba32a1b1f00618497c31b695178e79c8411805b982d0b789749c242afa487b7636f84b4dea478bdb0681dee5358fdf88683651fd22692ea58a341e0aeb37356c0b7db2dddb46046d97e4aa5c38e98d227c204624db457b37c0f40fbda0905c8f3f76f1332bd56f088049a1edb475dfe6283760be01784d0c8c68d1225b6717510564a46f7de20d51dca191f31ead0f34378a732e0c6810ecdb78344e9597f393ec36e794607b11e64e7973407a90d9034992b4a46427f67933ea269fea6c1848b806b6aa5c007b8072350057c983f01c241a896778e4770f863f335c74c3b2bbde90ca423b6cfba14597f01d4dbf3100a6f226a78bb11fea42b91cc73e9693d20525fabf4406bf06843ab78de6dea5af6548e4d2a64d560a9c913046e6c9227893f8ad309ccdeead630bd8db48d145776eaa1131d4a3ac2a01afda1caa3643fa35643dcdc3a4132244daa734e97b19ede738c08db38cc427244c90fd42d3daa4780ff82f425e2d9b7255438fb14326cc4e0e3c4c5bb27712848f1e2215187876189fa8c23bc91a8daddd7f6e69874339819947d86e36e3ac6f9e642d161f07416d5bbfe5e69c9d28356f6e9d58521ad850cb348191792fa026e0dbf56339aaf78b8c4462a9d1d25384f9b6a74fcd241be4431c14b3573b769f7b2ed4b0ad2c721accb95c5637ed9bf95c6f8d10a6d66e11e72a3ed8846bfe2342a65ffabd6d37d09750f48fbfe8d4b285503a8d05cb3db1b7d5d6c26af9d9c0c828f39923b5fac19bbba958fb0588b956e32411f64d2668de6df1474c082bcc0c108f312832119b02845565b3e796482b1ea1ab42a9b5e1752e9a28fbacfd3ed49e94665b6cc41088fab093cbc64068ead1a87bcc9c1bbc8db97b0ff9e7a237a6704dd82cc95dc4995c1693e79d7da4536443b1e4a0e0ac6a9ccb3b6a6e94c1cbe86aa59ef34ea74467231e62947b9119faad16a3317371a3709b3b61d46e1c452d1f2db4e14a5f420e50670081bfe9c8ce907b431fc32eec4a55eae6ee5ebc561c021e571e298088a28a06c0a91818317e4d81bfd1540c9deac5b46724c9042d9af525143ab294f98b9aa9ea7aaa67a68320f0d3c0a6da954bc51c86291cbed9254a96954e8334685231e73dfb7c0ed12fe287894fda155af3348dcffa9bb7fcb367f7d4b21bb72310a95e32fd4db3bc195e4e7238e903c1ba0016859e2a4f54f25d484f14aedbdc2472a0e8022137e66285730bfac21cf56b910df9d652e19931c871ae35301469be5648eea75aae0071c92f1d942807d5cb20ba3001af1d7e700e89f5eed644ea38507f4e8cb37f68f0c1d5bf8cea8777d22aafd299c8b822174d80e147b97379d2b2e958fd56b36fd4de6254812f588b8e6a12de23063ef7fae3b8e3b92862c7be861ef5748c3c3bc485995180afc2d85110b0ea6d18b68c6e845c88f13eafbc73d152519f5a2872caf3574fec8b8dd98b1d13d98a918b43abf65a9bcb5c332ef7f5a6fed9be0665806507bab122c6408d158922a49af73db5d08fa40b5aa6dea7496c7b6bf3e82789d40ece32c402e151e93dca2120806a1c141babaa198064b649bfff5a40afaf8f7f53137cd666b1b2e6edaab1d2e950e9fba92906cc5dd89ec49c13729fb9d4cd43cebec49e0e826af592410a6366ce9fb2e1513f3f3a9c2b30e491c649ca3c101b4123abc04b7374615c1c4bbb880dfd572d3283ad73723865f6662302b399ca830a2cfd04373cf4d2acd10b24fd33adbcfb2bb245c8b4921241b04bc759934bacd869d45592ff92e9e07d8a364814a66a149ca037e439fb6f835555fe22a12975279e0c72e21047af3336bfbbaf4581f8a8388a3bdd9c29e22d9589746a59d417397a6eea388d74e2dc854d960422779ecc25e431bb78da83d6324acccc658b3780510807e891946bb081346021832caee84980d7bd8e8bfbc3a86498c7138b0ce7ec5284aedc29d2cfe90c1929d4ea2604a196b13eb8e3aa24d916c0a409336174e8f31c17510d2c8496af3a8c6d3cb52870da8bb11f3bc9388f8ece1f701cde252a4a32f0e49c31b682bc15aebc89685a65d287ac7ff615495e3d73a1fa8360632804a092df13466fccb9049be5523c314f5d116df5833dc1543bb9357efcccda8f53ca2b83e54c52435f6935c9a1d5a2b730294fdb5012387d20f99f48e67c29a17727afb6649b422d2e1e2039eeba667f477fecc4d33108308d631b7413e44d3967e2b75bf64cc0509bb87c653d9d0ae2a2d1b1e70383d8411189c1d8a810f04cc5b71a0c898b7e334af1493af9d7b0819fb7c45c62f6bd5feb5ce2ec7673eec4c50ea138ab9fc55e49ffdc7309e5a8a33885a3a6c1d0c19997127eaa49f1e0b5d46d01cbce6cccc9641dfe59e9c3158033a9eaceaa6997e08a976206314b835b44dd7d02f8698369b01f283b843879df33caa7b72e5c3110d36bc52e3bec8bc73c39395f56d3c00b2126c48be62c9969e4627931a3af59d26c62d9693920fb05ed5b93c8fb257edbb79277c521ee2e09ce8e5646c4c9ee289d19a555d4f2f95e878b9cb43cbc2e7428b9078ca003bebd4eea99d82c5b01652fd1a7eaccf8d763738ebcd1a7801203657aa6c9211f100f7f2097597e37fd0c17f54bc81205f6df4845c154d0f3f16277699e6832ccad9084b9f1057c0cd0d4317da272a02175ccf481d81c0ba62d7d0b8aa264d52ebc7900929adb2ad9254ed2a449b08a3350178d71031889ae561f2fab44f6490617d4f78fd5dc5f94af1786307379817a241d882c3b8f3a6afadc50bc1a8eb519850422f26bf90ecc01e7f27722b3486c14cc53e296d189ee353d29fd40af54308e22887af21cf97bace6cbd53007fd6b158c860bb3766e2836091ce8d0062e5191d5919e7acf8223b50d99d71294a35708783cbf62e2888b5c9a4e3bd63ece3f58cbd633fb92d9860a6bf7daa39afd033bc35de1c9ad2e8c27ca69cbb70a26fe383474e174401f68d44dbcaaf99395fbae63d99ab48c95d08b4c754dbefd9db4bd36f8881121670961125c16a284e46c6e14c8247055a0be29fee251a7812d0690cd4ce146ab5d03e6bad016fec6592258146bb7fe9117eb29c1074f19775d8525f2e93f58169c51ff7798f173ed073952ed8c118c6f57cdd7ea08df7b6d5141fbc3c55c78ae75f7bae63933a88102a3ee4a12d43b0788d42a5bd7defa3ca8e11f4d51f78968a25b87cc5fa8a78a9134f6528f8a46b089c64510f4ca2f29db02eb493670ca6de00618b0907eff0141a1bce6b30ea17339058d651cc20296cd1d264c32e466913eb99c2006036a021b4a0695051f93526699813b92cc5689c7867d1025c7136d4c786e843d3324e02b21f4159008aa6f658e448bd024602b71b3f56ce22fe1794683f918661aa393e0971344b2954c5ddd958d99db63a34298a319bd0f620caca0a21359d09a4c747a047a044bf9c2fe2b6f075c3576e02fd56931d73503017cc914f731b653072b7d44646e48aa94390a9db476d13769b6b9a4d9d7977d17087c38a21957ab421b8ed70ef0459d687454a364b660dba88dbfcf1ceeecadaf65d0be22fcf0119f747008f89cbe65100307087aa777949ee090b909fde26556965528dddb516843b093ff10736561f004c8ead2696cbb0db42ad6b5efd91f07b04f4afd7fec4f854b02d1e98a2ed9b5f07f73f6b62d46a2be42a96c8f1ff72c9cde13704d00d2c453f4dd13032be94d819572817b7d0d494341ccf785b40ad83c932a8bde62e2b903728a2c321c551269f4a32e47443c4961d33962e978be2825d3e80175647efea055c466779ec90f3b38c87c8d1587a47372b248eee5c039d2670fbcb3f72f1a761b83cd0b71e98fa74d44617c8f7540a4e03a7b6ce659dbfb427bb0108d83cc4e2317c9920c17d2c7b6a637847b0f3c7f221f944be19c48c5783b5e44dd6f9201b017d388a6eb3ec740fa7f2a4c0998ed09960bd1dc167bac54f6700398eb81a619e396960f7ec4be643d12e6aaccc5a4f28fc2e5dfee0075fc83c10bad154c10580920c8b4141690846996d55ed67c2e2c122f4b81a832584bf740465ec4d143f3390bec0956b7b653232465173ffcaf56d0264973e6472d87ae3321fa6c1e9af4fea3aa94657e0142108fa8a065897620a8c66f1682e6512390c3244aae3e64abd9de67f90c109ec", "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"}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) [ 1514.932108] hfsplus: session requires an argument [ 1514.967062] hfsplus: unable to parse mount options 01:36:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:54 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:36:54 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0xff, 0x0, 0x0, 0x0, 0x0, 0x2000000}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_x25_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={@null=' \x00', 0xedb, 'vcan0\x00'}) r7 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) 01:36:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$unix(r0, 0x0, &(0x7f0000000100)) r3 = fcntl$dupfd(r0, 0x406, r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000000)={0x8, 0x7fff, 0x7fff, 0x60a138c7, 0x400, 0x9}) r7 = syz_open_pts(r6, 0x0) fadvise64(r1, 0x9, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) 01:36:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000540)={0x0, 0x0, 0x2080}) [ 1517.538004] hfsplus: session requires an argument 01:36:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="7523a29deb5645b9f58a9f91719d64b5ba738ab4c962dc1d78f07de5", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) 01:36:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) sched_rr_get_interval(r8, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000040)) r10 = syz_open_pts(r9, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f00000000c0)=0x5) [ 1517.564959] hfsplus: unable to parse mount options 01:36:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x41e223f4ef13cade, &(0x7f00000002c0)="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", 0x1000) syz_open_pts(r2, 0x2101) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x1005) 01:36:54 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:54 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r2, 0x0, r3) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:36:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TIOCSETD(r11, 0x5423, &(0x7f00000000c0)=0xa) [ 1517.758545] selinux_nlmsg_perm: 38 callbacks suppressed [ 1517.758557] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.801859] hfsplus: session requires an argument [ 1517.812467] hfsplus: unable to parse mount options [ 1517.822968] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.848230] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.862773] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.904461] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.918156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.931700] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.945129] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.958643] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 [ 1517.971932] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15391 comm=syz-executor.5 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:57 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000000)) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[]}}, 0x0) 01:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = request_key(&(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$read(0xb, r3, &(0x7f00000002c0)=""/165, 0xa5) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000040)) r5 = syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xbf98b73185ff5f2d, 0x0) setsockopt$inet6_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x7}, "05ce9532d533c6bf", "2a854f8611a866cdcaf80c62727a82811b78f13366bdadb2ed45b24294a05a2a", 'V)^g', "2b0609ca997561d5"}, 0x38) 01:36:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = fcntl$dupfd(r0, 0x0, r2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) getpeername$netlink(r3, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$VIDIOC_DBG_S_REGISTER(r4, 0x4038564f, &(0x7f0000000000)={{0x4, @addr=0x8}, 0x8, 0x6, 0xfffffffffffffff8}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000040)) r8 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x4, 0x20000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r8, 0x40405514, &(0x7f00000001c0)={0xa, 0x3, 0x7fffffff, 0x10000, 'syz1\x00', 0x6}) r9 = syz_open_pts(r7, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x8005) 01:36:57 executing program 2: socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:57 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r2, 0x0, r3) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:36:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$MON_IOCQ_URB_LEN(r9, 0x9201) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1520.678621] hfsplus: session requires an argument 01:36:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f00000000c0)={0x6, {0x81, 0x9, 0x80, 0x9}}) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1520.705070] hfsplus: unable to parse mount options 01:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r3, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f0000000100)={0x83c, {{0xa, 0x4e24, 0x6, @mcast2, 0x8}}, {{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x26}, 0x5a7}}}, 0x108) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) 01:36:57 executing program 2: socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:57 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r2, 0x0, r3) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:36:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) select(0x40, &(0x7f0000000000)={0x8, 0x9, 0xfffffffffffffffa, 0x5, 0x9, 0x3e6d, 0x8, 0xfffffffffffffc00}, &(0x7f0000000100)={0xfffffffffffffffc, 0x6, 0x2, 0x9, 0x1000, 0x92fb, 0x1f, 0x5}, &(0x7f0000000140)={0x4, 0x100000000, 0x6, 0x3, 0x7, 0x100000000, 0x0, 0x100000001}, &(0x7f0000000180)={0x0, 0x7530}) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:57 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000140), 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd15, 0x4, 0xfe, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00'}) syz_open_dev$usbmon(0x0, 0x0, 0x2) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) getsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) getpgid(0x0) getresuid(0x0, &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0x0) [ 1520.966851] hfsplus: session requires an argument [ 1521.005307] hfsplus: unable to parse mount options 01:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x3ef, &(0x7f0000000100)="a0499831746562b6c0876fd56b977eed57d09e4c0ce934661b4b7744792b83b151cb1c7908f0f6670eb0") r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000015", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r8, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f00000001c0)={r8, 0xe9}, &(0x7f0000000200)=0x8) getsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000003740)=""/4096, &(0x7f0000004740)=0x1000) setuid(r1) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VT_OPENQRY(r12, 0x5600, &(0x7f0000000140)) r13 = syz_open_pts(r9, 0x0) ioctl$TIOCSETD(r13, 0x5423, &(0x7f00000000c0)=0x5) 01:36:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:36:57 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 01:36:57 executing program 2: socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xdb4, 0x100000) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) 01:36:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) socket$netlink(0x10, 0x3, 0x0) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x1000000000001e, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffffffab}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)={0x73, 0x2, 0x2, 0x0, 0x0, [{r3, 0x0, 0x689c}, {r6, 0x0, 0x6}]}) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r8) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000040)) r10 = syz_open_pts(r9, 0x0) sched_setattr(r7, &(0x7f0000000380)={0x30, 0x6, 0x0, 0x80000001, 0x6, 0xffffffffffffffff, 0x410}, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f00000000c0)=0x5) 01:36:57 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 1521.304796] hfsplus: session requires an argument [ 1521.309708] hfsplus: unable to parse mount options 01:36:57 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r0, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1521.481672] mkiss: ax0: crc mode is auto. 01:36:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r2, &(0x7f0000000000)="f4e65326ec89f43c369c7d9b1ae5f7205bad59aedbcd3a8158e9b581625af4e61778389554f4de1d441b56d5c12705", &(0x7f0000000100)=""/70}, 0x20) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TCSETS(r8, 0x5402, &(0x7f00000001c0)={0xa8, 0x53, 0x2, 0xfffffffb, 0x11, 0x40, 0x0, 0x1, 0x7, 0x7, 0x9, 0x6}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = fcntl$dupfd(r18, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) r20 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r22, 0x0, r21) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r24 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r24, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r24, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r24, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r24, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = fcntl$dupfd(r26, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) r28 = syz_open_dev$mouse(&(0x7f0000000c40)='/dev/input/mouse#\x00', 0x9, 0x40) r29 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r31, 0x0, r30) r32 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r32, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r32, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r32, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r32, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r35 = fcntl$dupfd(r34, 0x0, r33) ioctl$PERF_EVENT_IOC_ENABLE(r35, 0x8912, 0x400200) r36 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000c80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r37 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r37, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r37, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r37, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r37, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r40 = fcntl$dupfd(r39, 0x0, r38) ioctl$PERF_EVENT_IOC_ENABLE(r40, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r42, 0x0, r41) r43 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r43, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r43, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r43, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r43, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r45, 0x0, r44) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r47, 0x0, r46) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000dc0)=0xe8) r49 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r50) sendmsg$netlink(r16, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f00000002c0)={0x410, 0x1d, 0x100, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x10, 0x70, @str='/dev/ptmx\x00'}, @typed={0x5c, 0x22, @binary="9a330a513b8b2e309b7bbc799f876c845a3f8a923b5e4ed9007b5d7898c7b3beb7d6a042fb6dd78a74e35689a6853ddf82fa7c0d67e6fdb9b6f8236f17c7f8851ecc79f53a141020f2030740bf51b20658dcbabb65"}, @generic="0acdfe2234dd88a1daf2ad80850ac01c3125ddea0e427246cecc9aceecc82f567049626ecbed0fa8dcaf9708a51f8661148ec66d85a03ce1a80b606f47a50e9196225fdb007d53fe89523f9775b55b897047c1f04ecd2230b660417092fd035344ac4b88234a68ef040443353e73e0139da8df3ab9bea54c0791d2b9271a7c7a815784b22c87f94a04b501c3474dd0e55bc5b69a5e38253a61ebd9e0bdfc5195333264716e2fc99f7f4e38f7faede23a64a8ec5661bdafd6488c87e49c6d2ef36a820c723494193d5a", @nested={0x24c, 0x38, [@typed={0x8, 0x25, @fd=r12}, @generic="d939ca256a21efad95c15804bebbdb9d34d8c22485c6554546abc8458a5f650bbb07516ae4759e4326719942708447568e2f378780c855ba7d12cee26044138aa79c17dcd9d578fdec55012bc0aad746dd8ed0e92c53e7ca369d201e633073f88f5c4b6b69cd6f0e23d14a668739cb32a643603180cf61e5f02002253dc3631cd5752cee4c241806341018bce3d99cce059ad6a4", @generic="ef984424ffddb5c46077b59a8a1dd8ee0183728c802fcc0a39e79752692ff2c0b752ea1016863292307742b3d07ccfd60a831832b8dc64af9c7a56ae9075ab", @generic="298b7f78924d57eda3760bb841e9f085fbb391a7ea07eb73b6edafe6bc65e320f17188fedab42f4c0956b3ad479215a5126739555904f059a6a0686370696bde66403a59bee929f44ce7687a20fa60968236f67525da22845a8ebdef3fb529d661cfe81b7100a5ce27f7ea46389ff5fd787fa56dd4286a134e2254bc5bcff40b533bfee476a2fbb6f455c86f4a2060bf71b2313f56347a384faefe72c2aa2ac989e027309107ca55db20e8d25ac1", @generic="2bc3416ee84006e3b79f351bf1b2d521d948135322ff3cd087e54c2192d7f73d64ab60f1448acefc56d76bc5e34f70ca179b11c6ef6915e715a567b844ff4fc89f6b9ff77a5420c610d601322f177a1615360c2011fa259da017807aaf3d6bed9d6c93153b2d91a6621b58c0d3bbaaad162f0b28418b", @generic="e6faeb7266a7673e426d5a9f6ac9aa427bed0f326cf6620fb8cf888c6962c8d66908e2bfa163d8542275be66d67f5609973fc3ac824433ef65e9e0a7e7", @typed={0xc, 0x27, @binary="2e8ef458a6b4"}]}, @typed={0x8, 0x2e, @fd=r19}, @generic="cc0aa9b9635c191cf16127c36ca661c8d4c2e84e9c805b3105da54a691d6d60e4200a42a4a246e88ddd86b9b0298ecda77eed6440065bda7d1393e0a6ac431ddda8d06aed3fbe2025aea238faff92180c819353048a0af587c6d8546ad669948bf846e93d80f746652f4668aa75930440984d406"]}, 0x410}, {&(0x7f0000000700)={0xe0, 0x12, 0x100, 0x70bd26, 0x25dfdbff, "", [@generic="c9a46954227d7daa4cb78738e8ddf9e1cef880bf63a622934801d1d0b2fd35926f239b04ec97a49632d61fecbf33d4dcc5e6f85723eda0f30dac143c01feb6628e05dbd174b5bb5f149f541ea5e1c67fc06ff9cd782157ed7a7b9eb227c719748f5490d630f5c70d351dbb94b53a0caffe914e49ef572081bea0a288ec1f53c2a881fda80d01995da60cef1fb5345dfb0f7fcd9515558bd578ca159f9bed4a8fe29dedc300c332fd312f3dd9d08fc8f8896de592395a4a3dd8422ec7", @typed={0x8, 0x27, @u32=0x10000}, @typed={0xc, 0x3d, @u64=0x3}]}, 0xe0}, {&(0x7f00000008c0)={0x2d8, 0x32, 0xc00, 0x70bd2a, 0x25dfdbfe, "", [@generic="e4dbe73d6b203bf7aa41dfc64a880d1b46dd70caf02bbf9f6b12d827e5a90cce19acb4da2436786882b0df4d9e3eed5c2f0fe62d8fdcae65b5389bc24799dc21c96da49c5ee1ab11d88b483751df3dc826eb0d3c", @nested={0xdc, 0x36, [@generic="1f7d56ffe2397b2ea0fc511129441395188b6ce006b1c168c9dbcf31c24d30aa0b35e4687a065dacfa6133422e29f2635233ddf466cd9db07d62ac56a8e91763831202fae9571765e66d47d99f30420873e296d15453ed0d64a5a6e11090863aee16300a42a0967bfa783d7ed34c0e3971d806b66d9bab6bb20c4d3874b12c54711f58a30a1d969865491030c5bf98a740b3afc83913", @typed={0x4, 0x67}, @generic="0012f82688042c5e0c03b7d7c940c50a5e86593a004713a2434c8e7e1f226c9944e519787170a52e7a62f2bc2840762bdff2290a0f92a7c3c163e5"]}, @typed={0x8, 0x93, @fd=r20}, @typed={0x8, 0x11, @uid=r4}, @nested={0x10, 0x87, [@typed={0x8, 0x1b, @ipv4=@remote}, @typed={0x4}]}, @nested={0xc, 0x8c, [@typed={0x8, 0x5c, @ipv4=@multicast1}]}, @nested={0xf4, 0x88, [@typed={0x14, 0xd, @ipv6=@dev={0xfe, 0x80, [], 0x20}}, @generic="e3258f863e5bc1553ee36ad08d562525e52a1d022cb3dcfecb253b75fbc62f9c90e986d31afafc1f76d5fb58c49baf376b44b96d4c6af34464d0e189ce1a6722d8b3abeef11e88fbda5e34948b42916527d6ceef1c944c2ac4453e3c424270438f8800964b4fd068b7cc", @typed={0x8, 0x63, @fd=r22}, @typed={0x8, 0x43, @uid=r23}, @generic="cfe2577047914857731df46ddea7b12fd79971ee4c08611dac05c96eed55904e4fc04080bcfbbd27cdbb2ccf5b125b39488c54782b1de37ebc57a844a9e6201c023942e17ffeef3b816d85307e345b212eb7b6e8193f0f91b34614ce625fa96a1852"]}, @nested={0x74, 0x81, [@typed={0x18, 0x20, @str=':-/vmnet1user#.]\x00'}, @generic="4f499bd8f2ca58748d34a4336c80e2e9fde946bb0c9ca60daad042e6d061eb16fd30e2f7ff1099c2b4a2dd6e69520d44e9809da962f4f595cae183244f20f5e62a24989b38f01beec8de37aa85d7d9fa4a6e8efb9f5dc9"]}, @typed={0x4, 0x2}]}, 0x2d8}, {&(0x7f0000000bc0)={0x18, 0x1c, 0x1, 0x70bd2a, 0x25dfdbff, "", [@typed={0x8, 0x70, @uid=r4}]}, 0x18}], 0x4, &(0x7f0000000e00)=[@rights={{0x34, 0x1, 0x1, [r24, 0xffffffffffffffff, r27, r2, r28, r29, r31, 0xffffffffffffffff, r32]}}, @rights={{0x14, 0x1, 0x1, [r35]}}, @rights={{0x2c, 0x1, 0x1, [r13, r9, r5, r12, r36, r37, r40]}}, @rights={{0x14, 0x1, 0x1, [r42]}}, @rights={{0x1c, 0x1, 0x1, [r43, r44, r46]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r48, r50}}}], 0xd8, 0x30004411}, 0x11) r51 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r51, 0x8912, 0x400200) setsockopt$RDS_FREE_MR(r51, 0x114, 0x3, &(0x7f0000000200)={{0x80000001, 0x9}, 0x4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) syz_open_pts(r11, 0x1) r52 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r52, 0x5423, &(0x7f00000000c0)=0x5) 01:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1521.559450] hfsplus: session requires an argument 01:36:58 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 1521.606169] hfsplus: unable to parse mount options 01:36:58 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r4, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x7f, @loopback, 0x7}}}, &(0x7f0000000200)=0x84) r5 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f0000000240)=0x16, 0x4) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00v', @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) 01:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r7, 0xc0945662, &(0x7f0000000140)={0x1758, 0x0, [], {0x0, @reserved}}) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) write$FUSE_IOCTL(r8, &(0x7f0000000100)={0x20, 0x0, 0x2, {0x8, 0x0, 0xfff, 0x4}}, 0x20) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000040)) r10 = syz_open_pts(r9, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f00000000c0)=0x5) [ 1521.854876] hfsplus: session requires an argument [ 1521.859769] hfsplus: unable to parse mount options 01:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:36:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = dup(r0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x2, [0x20, 0xffff, 0x401, 0xfff, 0x4, 0x5, 0xf4b6, 0x1, 0x1, 0x800, 0x9, 0x9, 0x2, 0xab, 0x483, 0xfffa, 0x0, 0x7fff, 0x7, 0x6, 0x2, 0x3, 0x400, 0x1, 0x1c49, 0x1, 0x1ff, 0x5, 0xcce, 0x0, 0x4, 0x1ff, 0x5, 0x800, 0x3ff, 0x20, 0x1, 0x4, 0x8, 0x8, 0x7, 0x7, 0x7, 0x8, 0xff, 0x0, 0xa94, 0x1], 0xb}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r6, 0x0, 0x1420000a77, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000300)={'team_slave_1\x00', @broadcast}) pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r7, &(0x7f0000000200)=""/250, 0x50c7e5e2) r8 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r8, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r8, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xfffffdf0) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000580)={@loopback, 0x4e, r9}) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000000)={r9, 0x40, 0x16, 0xb2, 0x1, 0x4, 0x2}) sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="7ddf00000000000001533ef1336e7bc700000500000063ea14f245c79a7b7b0f1e26025f6766f14ebc053825f1c21e590eddeeab5d3eb46c86387a5096c6208e1d9209dadf1d6d337ffa"], 0x14}}, 0x0) 01:36:58 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:58 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:36:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x12) 01:36:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$CAPI_NCCI_GETUNIT(r6, 0x80044327, &(0x7f0000000140)=0xffffffff) r7 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) symlinkat(&(0x7f0000000180)='./file0\x00', r10, &(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_RX(r13, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "4d723d204b88b86b", "2c268856e7a4a7508e15a58eda63446629c154caf0e08af40e0f0d40ff82f280", 'k\n&j', "6247c62fd46f4408"}, 0x38) [ 1522.401935] hfsplus: session requires an argument [ 1522.421550] hfsplus: unable to parse mount options 01:36:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000000)={0xc, 0x17, "1058125e818128237e4fbdb5b98951955cb99acd03fead"}, 0x1d) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}) r5 = syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x4) 01:36:59 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:59 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1522.628486] hfsplus: session requires an argument [ 1522.648890] hfsplus: unable to parse mount options 01:36:59 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:36:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xfffffffffffffd41) setuid(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) 01:36:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) r7 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r7, 0x0, 0x21, &(0x7f0000000000)=0x10001, 0x10) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1522.766308] selinux_nlmsg_perm: 107 callbacks suppressed [ 1522.766320] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1522.857952] hfsplus: session requires an argument [ 1522.868080] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1522.893115] hfsplus: unable to parse mount options [ 1522.918785] mkiss: ax0: crc mode is auto. [ 1522.939877] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1523.039153] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1523.168640] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1523.239292] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1523.301137] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1523.333167] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1523.390691] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 [ 1523.426160] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15589 comm=syz-executor.5 01:37:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:01 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) r9 = accept4$unix(r7, &(0x7f0000000180)=@abs, &(0x7f0000000000)=0x6e, 0x80000) ioctl$SIOCGSTAMP(r9, 0x8906, &(0x7f0000000100)) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:01 executing program 3: syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x4, &(0x7f00000001c0)=[{&(0x7f0000000140)="53c82b5e397f3d8737d30162c46332731c27c4ca6d9b8c109fecb93bfa5224df3763aaa57f8fa4055374a21b75626e6604c2b8a3558ce8747ac3141a51e81cc81391074cb6aa62975af4ebb802088aef95164b46fbb59b3b7b6db5627ac6219392ef53d3b8904903ac4da77bb6be6ebff9e5bc6b0a71531137", 0x79, 0x10001}, {&(0x7f00000002c0)="838e2e1e981714f75833f94c2a0ea496c1219929e6fd2aa25f27c31a6b1cb77fa7c563d239f752854c5c61b3b9617a927f4a58e3b5f710ca1e2d5d6c23e81ec16e337ff9d20d59b3712c6f80bad541675640bacb200c64684ada8c495eeddf8ab9e5922d8a1f5b3937733d3f2686604496846479339c4697cc2ee6516887591bec0ad4ba97fa0a1e1304d3f9b13beb5b760975f6b295531ea03d72181e5ffbfe2c1eff54785aa3cdc86868b4d2941fc82ee9e6286aa1fb03981cfaabdfe704932df2e69046c93ac728652b774c8369d17df69b62237748c92457", 0xda, 0x100000001}, {&(0x7f00000003c0)="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", 0x1000, 0x4}, {&(0x7f00000013c0)="1289fbcfbc6663d0758c1663a68a487bd2d83c1647df7b1111eea00a37729da982be33a8aaa948169d06f014e9102e5dde0391ffd3194a377cea556c48e7f92e2abe347938cd1d4b2efa02d93491b8ff4e34206c08605b6d7e35dcfd6b8a5e880ab56a440c1c041f1870390da769d9776c1a281a2289cfed721d47b694d4255f078aedfa91f242fdeade37201af6b1cc1d87f042cf2593d9061ab3ae9a971e97d51f68a5dbda891a30c457f568235d7b2de23d4d3f25632c1c67dedbd555a77f61ef0a307a1bdb9142470e414db246322f26c09992a077033d6d8fcec9010f731d25a99440006eef3f101436b6", 0xed, 0x101}], 0x2000000, &(0x7f00000014c0)='!$selfbdev\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:37:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000900000000"], 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r7, 0x40505331, &(0x7f0000000140)={{0x20, 0x2}, {0x8, 0x8}, 0x6, 0x1, 0x3f}) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400400000000800) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{}, {}, {}]}) 01:37:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040189}, 0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 1525.408566] hfsplus: session requires an argument [ 1525.409622] (syz-executor.3,15640,0):ocfs2_parse_options:1484 ERROR: Unrecognized mount option "!$selfbdev" or missing value [ 1525.439149] hfsplus: unable to parse mount options 01:37:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$packet(r8, &(0x7f0000000000), &(0x7f0000000100)=0x14, 0x80400) r9 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:37:02 executing program 2: r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:02 executing program 4: accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@bcast, @bcast, @default, @default, @remote, @netrom, @bcast]}, &(0x7f0000000000)=0x48, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1525.515792] (syz-executor.3,15640,0):ocfs2_fill_super:1217 ERROR: status = -22 01:37:02 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1525.587523] (syz-executor.3,15640,0):ocfs2_parse_options:1484 ERROR: Unrecognized mount option "!$selfbdev" or missing value [ 1525.643600] (syz-executor.3,15640,0):ocfs2_fill_super:1217 ERROR: status = -22 [ 1525.679804] hfsplus: session requires an argument 01:37:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) write$selinux_user(r2, &(0x7f0000000100)={'system_u:object_r:ipmi_device_t:s0', 0x20, 'user_u\x00'}, 0x2a) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) [ 1525.703430] hfsplus: unable to parse mount options 01:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_STREAMON(r4, 0x40045612, &(0x7f0000000000)=0x9) 01:37:05 executing program 2: r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getsockname$ax25(r2, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @bcast, @null, @null, @default, @null, @default, @netrom]}, &(0x7f0000000000)=0x48) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r9, 0xc0505350, &(0x7f0000000180)={{0x7, 0x5f}, {0x40, 0x48}, 0x9, 0x0, 0x20}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$TIOCSRS485(r12, 0x542f, &(0x7f0000000200)={0x8001, 0x0, 0x200}) 01:37:05 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="cfec12c53e9a3de37437add8ebd2ea19c207ee44fd111a4bb02c6c47254c4f", 0x1f, 0xfffffffffffffffe) r5 = request_key(&(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r5) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, 0x0, r5}, &(0x7f00000001c0)=""/108, 0x6c, &(0x7f0000000400)={&(0x7f00000002c0)={'sm3\x00'}, &(0x7f0000000300)="eb81098c5fd19dccb3d256d19aedbc63d39a8ff7699e449f3cec8c8d1cb75b04464bf2982a6c6f08aa3745f6f43f0c64bebb4056f9432f85c805b45bdc2785dabcb98b7a73605c5e42f5db265697426ecc51d8119f6f3ccc2a0456ad8bf864ae09dbe5929f231cb7e706c79bb66ca6a686eb9eb52884d40d9c1425d8a00cf44d02889945d50f5e17e54a0a2867412b1e0d14f2a88dbd8591e184c1fee6843282d22857a3179e3bd266f28d5a84b39137accca30ec3e02d0ffcc78da52997eb5051fe0aadc31fa03b8fb56b92299b33907cbea29a2e3f5e325eb44c720776cb031e33af3393a0b4457c15", 0xea}) [ 1528.509561] hfsplus: session requires an argument 01:37:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ustat(0x340, &(0x7f00000000c0)) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x10000, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="f450fa6e9bbcd8859e1c03ac8d16928d0468eab9a8966f0cddf16fd68e2c0d36c11e38b2a479c7a43157e95372667b1ff8de7e1116fde1622abf5e9c69c3d3f699a4cb1b51ca35518b27b543a6501492481c425bb7b4efa7adf5f19d1025f2be62dc9007506e25e1d8a90e3f7f7bd245e22f1270037c43d76b4a32b444147e40b146715302e6b835491133e9d4efbfff898704d72017258122ecc40fbe2bb13ca2cb20f745ea4352343dc09418dba2522266af34587f", 0xb6) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) 01:37:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_TSC_KHZ(r6, 0xaea2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) connect$rds(r9, &(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 01:37:05 executing program 2: r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1528.550454] hfsplus: unable to parse mount options [ 1528.568745] selinux_nlmsg_perm: 33 callbacks suppressed [ 1528.568759] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1528.649023] mkiss: ax0: crc mode is auto. [ 1528.653700] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1528.710239] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 01:37:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="15470000", @ANYRES16=r1, @ANYBLOB="7ded0000000000000000050000005d5679e8ce522d74e5f4b5836e931fae5debfae3124858757d215a8d7c602787ae4c243b1fa0e621730a789edb1fdf3cd5360935a57c176cdba0f68aff074ad1102a18a5c441562f06fe4ab97afbdd455052c33aa914f34c99a28dcd8a79b4ddbda275a030237aafc1fbbdf33a35797ccb289b803fed0500"], 0x14}}, 0x0) [ 1528.754071] hfsplus: session requires an argument 01:37:05 executing program 3: fanotify_init(0x24, 0x800) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xc00, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_GET_API_VERSION(r8, 0xae00, 0x0) pkey_alloc(0x0, 0x5) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x80000, &(0x7f00000002c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x3}}], [{@dont_appraise='dont_appraise'}]}}) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) 01:37:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000000)={0x3550, 0x7, 0x4373, 0x4, 0x6, 0x8}) r12 = syz_open_pts(r5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x1004, 0x0) ioctl$TIOCSETD(r12, 0x5423, &(0x7f00000000c0)=0x5) r13 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r13, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r13, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r13, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r13, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_tcp_TLS_RX(r13, 0x6, 0x2, &(0x7f0000000140)=@gcm_256={{0xd6d1ddb3b899ff29}, "139ccbd5d6d58230", "ad3e4b2616a486eaef914607e78503f8eb4b59ae894eff9975fa9881b027dab8", "806f5ed1", "e5f48bebd72edbd9"}, 0x38) [ 1528.780232] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1528.800768] hfsplus: unable to parse mount options [ 1528.853641] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1528.923029] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1528.975720] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1529.000658] mkiss: ax0: crc mode is auto. [ 1529.047073] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1529.095566] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 [ 1529.164327] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15701 comm=syz-executor.5 01:37:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x90, r5, 0x118d1933b0bc4a2d, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe9e}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xde}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1ff}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}]}, 0x90}}, 0x240040a5) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="2639000000000b1d30c2a9805fb7704905"], 0x14}}, 0x0) 01:37:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x82840) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001680)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000000000002002c001200082c61993ab23b7500010073687400203acb58fc1dea95fd3234c06f11f417908efdf423a9b0d16530d19caf68708befc7bdbf4439f26f148230536596cfc802f4aa5ae64d3202dc1487a9ad023fc0d2569e358aa8b198b1ac851c4b725a0b4a4e8494c6d279641717ce21c5c60df4d65365538781ec5eb9ec075b5564d9f3337b367d24dfeb2f726afbfb2362fe8427b7a865d587fa323e9119662b0145bde92aad7d721c3af7"], 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000011000104000000000000000002000000", @ANYRES32=r7], 0x2}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001640)={'vxcan1\x00', r7}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mq_unlink(&(0x7f0000001300)='btrfs\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_S_EDID(r11, 0xc0285629, &(0x7f00000013c0)={0x0, 0x70, 0x0, [], &(0x7f0000001380)=0x2}) setuid(r8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000001400)=[{&(0x7f00000002c0)="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", 0x1000, 0x3}, {&(0x7f0000000140)="c339b06a618257cd359e56ed30430177c74c27ff2a4751bd62eafdcaed5427783cc05a4483cf789122e8201b391f430ad6aa0a300cfeb91c47eeffa1cddf1375cd599f6c2ccc6cbd86d62285f9f0ff91423533e23b21f72e6b2650e8f78f0b30092f622ed9e7ff571fa67c692223d6180b16ebbacc7fc3f7ce42f8dd8ab5a60b02993c98f0445e21368e134f0b575cceb6948feb8ca907a73dace12722a179f61602d4c4046325cb92ec7593f7c67d76f1091bc2488c211533b7376b950c745c4e272efba31b6ef7800c81e5de7421571a5a40aa197527aeab3066a6b7284a6662354b", 0xe3, 0x800}, {&(0x7f00000012c0)="da132cb0522de24b00cb70edd51c3732fd7cbc7ea31cd05ddfa3", 0x1a, 0xfffffffffffffff9}, {&(0x7f0000001540)="4407205c48e27961ca5cb0e67cfa171a3d10d7bd78608ba196be64df5a144f5bfe6b10038f52a2e7f7986e754f660c264856d1cdd31605cd1cfd9c321b04ae016fa52c923efc27e7459a19654e7d9d5b97dfa638998d2bed2940a23fd64509e735aa09902b834dff7357f5921147f4118352de23f045a01cb6f77efa3a7c7235ed467e48e2999d9a85f43e79481593e4f402508b7ed8fbf45b9e6b1e05a7c21ad0c37cd8bee2de291fa5328e811c4026b9c125f047746c88c3e520ec97a8ef3b9e45318a", 0xc4, 0x5}], 0x8b000, &(0x7f0000001480)=ANY=[@ANYBLOB="7373645f7370726561642c0000002c73706163655f63616368652c636f6d6d697430303030303030303030363430642c7265665f7665726966792c6e6f64617461636f772c757365725f737562766f6c5f726d5f616c6c6f77489d2c61707072696973652c646f6e745f686173682c666f776e65723d0000000000", @ANYRESDEC=r8, @ANYBLOB=',fsname=/dev/ptmx\x00,\x00']) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:37:08 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r9, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r7, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0xa8, r9, 0x1, 0x70bd2d, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r10, 0x40045431, &(0x7f0000000040)) r11 = syz_open_pts(r10, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r7, 0x800442d2, &(0x7f00000003c0)={0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, @random}]}) ioctl$TIOCSETD(r11, 0x5423, &(0x7f00000000c0)=0x5) 01:37:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14001000", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f00000000c0)=0x8000) [ 1531.592153] hfsplus: session requires an argument [ 1531.597383] hfsplus: unable to parse mount options 01:37:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x121100, 0x0) accept$inet6(r3, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x6}) r4 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) 01:37:08 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$unix(r1, &(0x7f0000000100), &(0x7f0000000000)=0x6e) fsetxattr$security_evm(r3, &(0x7f0000000180)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x109, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)) syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x6) [ 1531.819026] hfsplus: session requires an argument 01:37:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) [ 1531.839730] hfsplus: unable to parse mount options 01:37:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:11 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept$inet(r2, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) r7 = fcntl$getown(r6, 0x9) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x2, 0x96, r7, 0x0, r8, 0x0, 0x2, 0x5}) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="41010000000000000000010000002c0001000c00070000000000000000000c0006006cc9626c63720000080001000a0000000800050000000000"], 0x40}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r9, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0xd0, r11, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffb}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x984b}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xb813}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x10}, 0x4000050) sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r4, 0x3ecb7b9d36d9df7d, 0x20000}, 0x14}}, 0x0) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) 01:37:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000140)={0x5, 0x8000, {0x56, 0x200, 0x6, {0x3, 0x6}, {0xbf6, 0x1f}, @cond=[{0xbcf3, 0xb84f, 0x9, 0x401, 0xfe, 0x9}, {0x1, 0x8001, 0x1, 0x9, 0xfffb, 0x3}]}, {0x54, 0x1ff, 0x101, {0x2, 0x4dc}, {0x3, 0x800}, @ramp={0x1, 0x800, {0x1, 0x8, 0xfff, 0x8000}}}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000000)) r7 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) 01:37:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RCLUNK(r7, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) dup2(r7, r5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$MON_IOCX_MFETCH(r11, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x61af}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r12 = syz_open_pts(r8, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$USBDEVFS_BULK(r15, 0xc0185502, &(0x7f0000000200)={{0xf}, 0x9, 0x2, 0x6e, 0x8, &(0x7f0000000180)="81e1d84bf16b7ad40554b6b5ab92d5b48ae7fc9a580289dd4ae7c8cd40f009c17dec0677bb3d45c29809e88c5fcd79155c9d2f2f942d8dc1aecaa38a2be8027dea0a77e560ac671206034d755d15eadcb996412e50de5e62622643f71f0d2f36f72cc210252addb4c83c1a17ce45"}) ioctl$TIOCSETD(r12, 0x5423, &(0x7f00000000c0)=0x5) 01:37:11 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 01:37:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="e44dabbe1f92000000"], 0x14}}, 0x0) 01:37:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) uname(&(0x7f0000000100)=""/123) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) [ 1534.727889] hfsplus: session requires an argument [ 1534.743900] hfsplus: unable to parse mount options 01:37:11 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 01:37:11 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:11 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) syz_open_pts(r5, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000100)) r9 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:37:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = creat(&(0x7f0000000100)='./file0\x00', 0xd12b5c829fc416e4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r4, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000140)={r4, 0x4}, &(0x7f0000000180)=0x8) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r5, &(0x7f0000000000)='net/llc\x00') lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000300)='\x00', 0x1, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1534.999668] hfsplus: session requires an argument [ 1535.005638] hfsplus: unable to parse mount options 01:37:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:14 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 01:37:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000000)={0x4, 0x2, 0x7, 0x1ff, 0x72e}) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) 01:37:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000100)) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000000)={0x0, 0x100, 0x40000001, 0x80000001}) r7 = syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) 01:37:14 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000440)=0xfffff000, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f00000002c0)=[@in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @local}, 0x4}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x27}, 0x7}], 0x68) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURBNDELAY(r9, 0x4008550d, &(0x7f0000000000)) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x10000) sendto$netrom(r13, &(0x7f0000000100)="ad825ed753109e27eaae55caf07ec0b74a23099ea530785f1840dd9a7e442a77504cfff0f8f1afcc37d9066c328abe90a207b8f9eb9dc89a6fbdc9c79afd176de1d7c57bc623d515046eb400a8fcc550261577f3d857430a4d58", 0x5a, 0x4000000, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) r14 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r14, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) sched_getparam(r4, &(0x7f00000003c0)) setsockopt$inet6_int(r14, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r14, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r14, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r14, 0x8983, &(0x7f0000000340)={0x2, 'veth0_to_bridge\x00', {0x5}, 0x8}) r15 = syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r15, 0x5423, &(0x7f00000000c0)=0x5) [ 1537.877567] hfsplus: session requires an argument [ 1537.887911] hfsplus: unable to parse mount options 01:37:14 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:37:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f00000003c0)={0x7ff, 0xff, 0x0, 0x2, 0x2, [{0xcb8, 0x14e, 0x4, 0x0, 0x0, 0x405}, {0x5, 0x3, 0x40, 0x0, 0x0, 0x1000}]}) r6 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r7, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40095}, 0x1) r8 = socket$inet6(0xa, 0x3, 0x9) getpeername$unix(r4, &(0x7f0000000300)=@abs, &(0x7f0000000480)=0x6e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r11, 0x40045730, &(0x7f00000000c0)=0x7ff) recvmmsg(r8, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r8, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=r8, @ANYBLOB="7ddf000000000000000005000000"], 0x3}, 0x1, 0x0, 0x0, 0xc000000}, 0x4000) 01:37:14 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fdatasync(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$sock(r2, &(0x7f0000000340)={&(0x7f0000000100)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(poly1305,fpu(pcbc(aes)))\x00'}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="21e4ad26707c4a1e5fa6534513631a0fe37c548daa50aff02de9ac016eef816a3ece729104410d3eed4cd120012892108a5adce28dd686abf4f38d353135881dd10a36d8c039d6cb", 0x48}, {&(0x7f0000000000)="16464ce5b37db5c87c222d537b1b37f2a8fd42048f1fc8991e", 0x19}], 0x2, &(0x7f00000002c0)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}, 0x40000) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000040)) r8 = syz_open_pts(r7, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f0000000380)=0x3a56, 0xfffffffffffffcd5) ioctl$TIOCSETD(r8, 0x5423, &(0x7f00000000c0)=0x5) 01:37:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x40040030) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) recvmmsg(r6, &(0x7f0000003080)=[{{&(0x7f0000000140)=@sco, 0x80, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x1}, {{&(0x7f00000012c0)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001340)=""/141, 0x8d}, {&(0x7f0000001400)=""/70, 0x46}, {&(0x7f0000001480)=""/85, 0x55}, {&(0x7f0000001500)=""/225, 0xe1}], 0x4, &(0x7f0000001640)=""/14, 0xe}}, {{&(0x7f0000001680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/120, 0x78}, {&(0x7f0000002780)=""/215, 0xd7}, {&(0x7f0000002880)=""/50, 0x32}, {&(0x7f00000028c0)=""/227, 0xe3}, {&(0x7f00000029c0)=""/153, 0x99}, {&(0x7f0000002a80)=""/47, 0x2f}, {&(0x7f0000002ac0)=""/29, 0x1d}, {&(0x7f0000002b80)=""/100, 0x64}], 0x9, &(0x7f0000002cc0)=""/243, 0xf3}, 0x4}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002dc0)=""/74, 0x4a}, {&(0x7f0000002e40)=""/153, 0x99}, {&(0x7f0000002f00)=""/218, 0xda}], 0x3, &(0x7f0000003000)=""/77, 0x4d}, 0x66}], 0x4, 0x80002002, &(0x7f0000003180)={0x0, 0x1c9c380}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$KVM_GET_XCRS(r11, 0x8188aea6, &(0x7f0000000100)={0x3, 0x7, [{0xfb, 0x0, 0x9}, {0x2, 0x0, 0x2}, {0x400, 0x0, 0x1}]}) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r12 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r12, 0x5423, &(0x7f00000000c0)=0x5) [ 1538.064517] selinux_nlmsg_perm: 38 callbacks suppressed [ 1538.064529] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.135528] hfsplus: session requires an argument [ 1538.138294] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.167383] hfsplus: unable to parse mount options 01:37:14 executing program 2: socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1538.207742] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.296288] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.367432] hfsplus: session requires an argument [ 1538.379628] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.398305] hfsplus: unable to parse mount options [ 1538.422017] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.485042] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.528316] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.558559] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 [ 1538.577251] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15900 comm=syz-executor.5 01:37:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x5) 01:37:17 executing program 2: socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:17 executing program 5: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 01:37:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRES64, @ANYBLOB="7ddf0000000000f9ffffee000000fe186c0d3fdfc29b75456cc1d7fe218acdb3e97db2b96ce5c2476c5663f789d34b80d893d8af193aff5fe6d6bc51b180aa271d32a444905bdd511b8d4bb1f31ebe4233716812d338c0e4174f9a20da5efd3b7586e042f6aaab8e22161f6fab20c9b544f5730179ee7b62b5bd7fafb9548723da6d3d3a81d21ec596c56abab7571fcfbc322fc11dbad1cac7a17260c0dff6435557da8697f5c7b8c2fea64b8667e32274d31011d0d6"], 0x3}}, 0x0) 01:37:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x2, 0x7fff}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r6, 0x8, 0x20}, &(0x7f0000000200)=0xc) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r7 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r6, 0xef, 0xe0}, &(0x7f0000000100)=0x8) 01:37:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18200020}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x1f0, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x67}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8bfb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7c0}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffbff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd418}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1b62}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x231}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x1f0}}, 0x20020000) ioctl$VIDIOC_G_ENC_INDEX(r4, 0x8818564c, &(0x7f00000005c0)) 01:37:17 executing program 5: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1540.977617] hfsplus: session requires an argument [ 1541.015537] hfsplus: unable to parse mount options 01:37:17 executing program 2: socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3, 0xffffffff}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:37:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x200, 0x0) fsetxattr$security_smack_transmute(r6, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000}) r8 = syz_open_pts(r7, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r16, 0xc00c55ca, &(0x7f0000000500)={0x0, 0x4, 0x81}) r17 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r17, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000440)=0xe8) write$FUSE_ATTR(r11, &(0x7f0000000480)={0x78, 0xffffffffffffffda, 0x3, {0x54b, 0x3ff, 0x0, {0x3, 0x10000, 0xefb3, 0xe9, 0x3ff, 0x2, 0x6, 0x2, 0x6, 0x9598, 0x4, r18, r5, 0x1ff, 0x7}}}, 0x78) ioctl$TIOCSETD(r8, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) ioctl$TUNSETIFF(r21, 0x400454ca, &(0x7f0000000300)={'netpci0\x00', 0x311}) sendto$inet(r21, &(0x7f0000000200)="c256db14311ff66ae556ba0ef1978c3a91fac48e8a7b644bbb637bafb653e111c474f43b1010a335203be84bf584ab01da7a5d7fd6973e4385b8f1275d75d5dd2fb0128164e0ab70076b74ef041b6d7e592a69455ee4d1165c5373bb0a51e30e4a540bc09fb7808bd6c272b9736ce173da2d7957b8c8db6904d66e", 0x7b, 0x10, &(0x7f00000002c0)={0x2, 0x4e22, @multicast2}, 0x10) 01:37:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000079ece267"], 0x14}}, 0x0) [ 1541.234349] hfsplus: session requires an argument [ 1541.251621] hfsplus: unable to parse mount options [ 1541.284790] mkiss: ax0: crc mode is auto. [ 1541.408012] mkiss: ax0: crc mode is auto. 01:37:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf0100000000ecffff04000800"], 0x14}}, 0x0) 01:37:20 executing program 5: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 01:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000100)={0x1f, 0x400, 0xff, 0x7}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) 01:37:20 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0xfffffffffffff001) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000200)={0x10004, 0x2, 0x4000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x353c00) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = request_key(&(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r12) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r12, 0xe2, 0x1000}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'sha224-ssse3\x00'}}, &(0x7f00000002c0)="9ac9d694ded3da6d10cb2642ec80e01a3e383e90f8166afc8c36f971dc282d1c302f124ff25570e7f12449b7f2d890000f1285b6f78387620ced7a44ea638a4b8622c126b7d17d247eea69d75e5f371e8c080712591229b01849996596a963057700f9d7d59a529205e64b76a994bf95615971eea24b5d4cb250982a482f0447dc0f2438dc5ed24a96000c280dade760222747f1862fb188dfa3f8e1c6cbce177d58d294d25210cc32cb4081e5564ef2e41a82d66670259a3177ffba4b202c24e3705d3345cc66cac31ab2005931f1d0537ded3dfb856c378594edae53411e47c5b5", &(0x7f00000003c0)=""/4096) r13 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$VT_SETMODE(r13, 0x5602, &(0x7f0000000000)={0x3, 0x6, 0x7, 0xff, 0x91}) [ 1544.078043] hfsplus: session requires an argument 01:37:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000180)=""/157) 01:37:20 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1544.105295] hfsplus: unable to parse mount options 01:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x800, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) set_tid_address(&(0x7f0000000000)) 01:37:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x141040, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) r7 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r7, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r7, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10, 0x0, 0x20000}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="af3acb58fc1dea95fd3234c06f11f417"}]}}}]}, 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000011000104000000000000000002000000", @ANYRES32=r10], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@rand_addr="d7289a066d9f7b1ae20bbce52f0dfdc2", 0xb, r10}) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:20 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1544.254486] selinux_nlmsg_perm: 6 callbacks suppressed [ 1544.254497] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 [ 1544.286562] input: syz1 as /devices/virtual/input/input12 01:37:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socket$nl_xfrm(0x10, 0x3, 0x6) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$SNDCTL_DSP_RESET(r15, 0x5000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockopt$CAN_RAW_JOIN_FILTERS(r18, 0x65, 0x6, &(0x7f0000000100), &(0x7f0000000180)=0x4) setsockopt$TIPC_CONN_TIMEOUT(r9, 0x10f, 0x82, &(0x7f0000000000)=0x3550, 0x4) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1544.329811] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 [ 1544.356379] hfsplus: session requires an argument [ 1544.358236] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 [ 1544.373994] hfsplus: unable to parse mount options 01:37:20 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x28000, 0x0) mmap$snddsp_status(&(0x7f0000ffc000/0x3000)=nil, 0x1000, 0x1, 0x9f533cdd8ca92c7a, r0, 0x80000000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setuid(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) [ 1544.385519] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 [ 1544.413604] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 01:37:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r1 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r1, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf000000000000020005000000"], 0x3}, 0x1, 0x0, 0x0, 0x84}, 0x0) [ 1544.446257] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 [ 1544.468112] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 01:37:21 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1544.492874] mkiss: ax0: crc mode is auto. 01:37:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000100)="a2ccc7fd7a32951fabb6ba63b914445063ef613d5008696193ee139066f1bbd896c3b45088d103a08bad8d538f1f7ab44c8d8085b94a3123d4d3196d5735ac17ac3d49670a4b88303926e1467394f13831ec185f9710426501e690c6fd69a78599821bb11564fa4f4e3d05ec49ec7a", 0x6f, 0x80, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x80001389, @reserved}, 0x80) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1544.545058] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 [ 1544.603913] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 [ 1544.652187] hfsplus: session requires an argument [ 1544.657073] hfsplus: unable to parse mount options [ 1544.673310] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16031 comm=syz-executor.5 01:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8a0020, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000001c0)={{0xf8, 0x2, 0x7f, 0x7, 0x2, 0x6}, 0x9, 0x3f, 0xbee, 0x8, 0x4, "2d4f467218a3ae236ec75d950a593e32812bfbbfb7aebebb2d9b2bb64d9004f2fd457b49f0f42f918cc904082219264237e2718c32dd0afa0a38ab0b9cfd58f80aac30d493d465b49069fc7748206020f27f049649c14d5649cf23a26036dd9101bf8d5230d35a29f53f2a9d950f491e4cf64195a43bdfed521f082c13739875"}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xfffffffffffffedb) setuid(r2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r3, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) write$binfmt_script(r1, &(0x7f00000005c0)={'#! ', './file0', [{0x20, 'bdevGPL*wlan0keyringvmnet1em0'}, {0x20, '/dev/ptmx\x00'}, {}], 0xa, "cfeb4a3053cd75084a302a5f65d588e198f4f7628846727d6153096efc"}, 0x52) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={r3, @in={{0x2, 0x4e20, @rand_addr=0x9}}, 0x2, 0x40, 0x8, 0x1, 0x7c}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000440)={r4, @in6={{0xa, 0x4e24, 0x8001, @mcast2, 0x1000000}}}, 0x84) r5 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGSND(r8, 0x8040451a, &(0x7f0000000280)=""/209) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) 01:37:23 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000001c0), &(0x7f0000000340)=0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xffffff97) setuid(r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r11 = socket$nl_route(0x10, 0x3, 0x0) splice(r10, 0x0, r11, 0x0, 0x1420000a77, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000300)={'team_slave_1\x00', @broadcast}) pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r12, &(0x7f0000000200)=""/250, 0x50c7e5e2) getsockopt$inet6_IPV6_XFRM_POLICY(r12, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFDSTADDR(r10, 0x8918, &(0x7f0000000580)={@loopback, 0x4e, r13}) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000100)={@mcast1, @dev={0xfe, 0x80, [], 0x26}, @ipv4={[], [], @multicast2}, 0x9b, 0x6, 0x0, 0x0, 0x3, 0x800215, r13}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r14 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r14, 0x40045431, &(0x7f0000000040)) r15 = syz_open_pts(r14, 0x0) ioctl$TIOCSETD(r15, 0x5423, &(0x7f00000000c0)=0x5) 01:37:23 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:37:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'security\x00', 0xc3, "2d6d93fcc2234ff2126333c72dc6fd2d1ba0ada5658fedbd6fea34c0791ca9f670ef6c39e645c6be401fb87abe40ef0510968c33f83cb7113401a3604bc089d61fab002833bd936d088ad1615d097ee55d0fe153a3b4fe0c9b0bf4aa262562f11bd0b2dda72b7ca8fcc74556c6aa7bfddb8670405310ba32d81a27385253824f3bea8f24221eed9bf998be60de20812c97d093d2f6685aa9a6ab65f651db96c6af6e1c6e690d6f1a65a14223dd5229639777c2c95a0c04a15d1e77442c4b3f63e60b67"}, &(0x7f0000000000)=0xe7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$CAN_RAW_RECV_OWN_MSGS(r4, 0x65, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x4) 01:37:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) getsockopt$sock_buf(r3, 0x1, 0x37, &(0x7f0000000100)=""/135, &(0x7f0000000000)=0x87) setuid(r1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000040)) r5 = syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) [ 1547.189097] hfsplus: session requires an argument [ 1547.194390] hfsplus: unable to parse mount options 01:37:23 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r4, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:37:23 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:37:23 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1547.363708] hfsplus: session requires an argument [ 1547.373510] hfsplus: unable to parse mount options [ 1547.396455] mkiss: ax0: crc mode is auto. 01:37:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) [ 1547.580975] hfsplus: session requires an argument [ 1547.597055] hfsplus: unable to parse mount options 01:37:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:26 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) setsockopt$sock_int(r3, 0x1, 0x13, &(0x7f0000000000)=0x8, 0x4) setuid(r1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000040)) r5 = syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r12, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r13, @ANYBLOB="41010000000000000000010000002c0001000c00070000000000000000000c0006006cc9626c63720000080001000a0000000800050000000000"], 0x40}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r11, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x41002400}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x154, r13, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xbc}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x80}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x45}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fffffff}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3ff00}]}, 0x154}, 0x1, 0x0, 0x0, 0x50}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r8, 0x111, 0x2, 0x1, 0x4) 01:37:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400001, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f00000000c0)={0x4, 0x0, [{0xb53, 0x0, 0x10001}, {0x938, 0x0, 0x7ff}, {0x8f, 0x0, 0xfffffffffffffbff}, {0xb01, 0x0, 0x6}]}) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x120, r1, 0x3ecb7b9d36d9df7d, 0x0, 0x0, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0xfffffe59, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}]}, 0x120}}, 0x0) 01:37:26 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x80) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="08ee06001000", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) [ 1550.365116] selinux_nlmsg_perm: 38 callbacks suppressed [ 1550.365160] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 01:37:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-'}, 0x28, 0x2) setuid(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) [ 1550.513894] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 [ 1550.546752] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 01:37:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f00000002c0)={0x6, "27c00f4c9a412b5954e576dd7bad5e2b13e8159e67a044931c961bfa03527de4", 0x0, 0xaf, 0x4, 0x3200e0, 0x200, 0x2}) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf2dbd70000002000005000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000240)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x7, @mcast2, 0x1}}, 0x24) ioctl$VIDIOC_CREATE_BUFS(r8, 0xc100565c, &(0x7f00000000c0)={0x8, 0x33, 0x3, {0x3, @sliced={0x5593, [0x40, 0x3, 0x1, 0x5, 0x8000, 0x2, 0x0, 0x3, 0x7fff, 0x0, 0x0, 0x40, 0x5, 0x8a51, 0xe767, 0x3f, 0xf800, 0x8, 0x1f, 0xdcc, 0x3, 0x0, 0xfff9, 0x800, 0x3f, 0x6, 0x8, 0xafa, 0x7f, 0xb5, 0x3ff, 0x4, 0x0, 0x7fff, 0x8, 0x2, 0x2, 0x8, 0x7fff, 0x7, 0x200, 0x20, 0x0, 0xff, 0x1ffc, 0x3, 0x1f, 0x38a], 0x1000}}}) [ 1550.563360] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 01:37:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) ioctl$TCSETS(r9, 0x5402, &(0x7f0000000100)={0x0, 0x3ff, 0x7fffffff, 0x8, 0x1, 0x5, 0x81, 0x9, 0x2, 0xb97, 0x1d681d15, 0x9}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r9, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x79, "c1537f485709e5907ed6db0010df357c7f6e43df27abcf43fd14195654675289448b62e8386d004b71ddff54766423ef628c9d2fef358fd19a7a8ce35d85b01e382eccc4d3520d0f0fc1e7d8e42cdb304aec2bbc5bb9fac659e26c4ddfb5b56df92b9887a260e7a43b4ebfe9bf849231559195ac0633f77f2d"}, &(0x7f0000000200)=0x81) setsockopt$inet_sctp_SCTP_AUTH_KEY(r9, 0x84, 0x17, &(0x7f00000002c0)={r10, 0x40, 0x48, "469f60614737dee41592a63063ed18a3e4fe8cd06eee3dafaafdebba21acc82759a68aeb1ccdb6ea5ed5d9e5ea10373a11cd7cf95a72d62841d254ea87286cf82d895c60c8a37dda"}, 0x50) r11 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TCSETS(r11, 0x40045431, &(0x7f0000000040)={0x8, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r13) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r15) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r17) r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r19) r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r21) r22 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r23) syz_mount_image$ntfs(&(0x7f0000000340)='ntfs\x00', &(0x7f0000000380)='./file0\x00', 0x80, 0x1, &(0x7f0000000480)=[{&(0x7f00000003c0)="d2f2df8d034564c940bd3366d49049d441710afa6d66ea227d88d266652e3a1a712bb485a40bf782d3c3157d10eda7790a349aff80b2404830e5cdecfccdb96990abc694967d22970c86947c9a1539a4dbd722818052adeb9bd5a02860a57c8f7afb593f1ca94c040e2e2cfcb66b905265d8f697743e698ee77992a2cf5164ae6d44100b4f245a3f00556f5a2ea6fad55c4dc773a7ff459b4882d9acde507b9090e2a12bd06606075d88", 0xaa, 0x4}], 0x2, &(0x7f00000004c0)={[{@gid={'gid', 0x3d, r13}}, {@umask={'umask', 0x3d, 0x6}}, {@errors_remount='errors=remount-ro'}, {@dmask={'dmask', 0x3d, 0x8}}, {@utf8='utf8'}, {@gid={'gid', 0x3d, r5}}, {@gid={'gid'}}, {@disable_sparse_no='disable_sparse=no'}, {@show_sys_files_yes='show_sys_files=yes'}, {@errors_recover='errors=recover'}], [{@obj_type={'obj_type', 0x3d, '/dev/zero\x00'}}, {@fowner_gt={'fowner>', r15}}, {@measure='measure'}, {@smackfsroot={'smackfsroot', 0x3d, '%keyringbdev/'}}, {@fowner_gt={'fowner>', r17}}, {@euid_lt={'euid<', r19}}, {@obj_role={'obj_role', 0x3d, '/dev/zero\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x64, 0x36, 0x66, 0x63, 0x33, 0x2f2a96ddb6a0297b], 0x2d, [0x30, 0x66, 0x38, 0x37], 0x2d, [0x5e, 0x63, 0x33, 0x37], 0x2d, [0x39, 0x61, 0x38, 0x38], 0x2d, [0x33, 0x66, 0x39, 0x3e0bbefad82304df, 0x39, 0x38, 0x38, 0x63]}}}, {@uid_eq={'uid', 0x3d, r21}}, {@euid_eq={'euid', 0x3d, r23}}]}) r24 = syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r24, 0x5423, &(0x7f00000000c0)=0x5) [ 1550.621011] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 [ 1550.684702] mkiss: ax0: crc mode is auto. [ 1550.698844] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 [ 1550.727146] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 [ 1550.776636] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 [ 1550.922992] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 [ 1550.945069] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16160 comm=syz-executor.5 01:37:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="ca71b88d854843c49adfe5641fb5a9eb6106a06762dfa5ad907c66a6eea04713507be082", 0x24, 0xfffffffffffffffd) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) keyctl$chown(0x4, r4, r6, r7) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:37:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRESOCT], 0x1}}, 0x3cd8d132342e31c0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000100)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80, 0x80800) r7 = fcntl$dupfd(r5, 0x0, r6) r8 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x40c0, 0x0) ioctl$sock_rose_SIOCDELRT(r8, 0x890c, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x81, @default, @netrom={'nr', 0x0}, 0x3, [@default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r11, 0xc1004111, &(0x7f0000000380)={0x1, [[0x2, 0x8, 0x80000001, 0x2, 0x0, 0x81, 0x8000, 0x5], [0x4, 0x2, 0x9, 0x5, 0x9, 0x2, 0x8, 0x7], [0x1, 0xb27, 0x7ff, 0x4430d7fc, 0x2, 0x3, 0x0, 0x10001]], [{0x6, 0x2, 0x8}, {0x10001, 0x3, 0x2adae417}, {0x5, 0x9, 0x6e0e}, {0x9, 0x8, 0x6}, {0x8000, 0x400, 0xbea9}, {0x10000, 0x0, 0x20}, {0x6b9f, 0x2, 0x7}, {0x8, 0x101, 0x6e}, {0xdd, 0x0, 0x5}, {0x5, 0x7f, 0x4}, {0x80000000, 0x1ff, 0xec6}, {0x1000, 0x2, 0x8001}], 0xfff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x8400200) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f0000000000)) 01:37:29 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)) r7 = syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) 01:37:29 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:29 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') lsetxattr$smack_xattr_label(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)={'devlink\x00'}, 0x9, 0x4) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x188, r1, 0x3ecb7b9d36d9df7d, 0x0, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x188}}, 0x0) 01:37:30 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1553.463767] audit: type=1400 audit(1575250650.013:146): avc: denied { setattr } for pid=16221 comm="syz-executor.1" name="exec" dev="proc" ino=184823 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 1553.548818] mkiss: ax0: crc mode is auto. 01:37:30 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:30 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) fcntl$setpipe(r9, 0x407, 0x7) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) timer_create(0x2, &(0x7f0000000640)={0x0, 0x1, 0x2, @thr={&(0x7f00000004c0)="c52170b0896b3df7bfe1768113480dde6d372b08087a79909c28394a759cdeb6e5ac005b8c3bbf31bb9fe9d54722fc52f2a060ea27469a67e07ad0a16c51ea1f4110ec2fadfd3318c4cba15ea6886c96bf543ba1fce4a1e03c89a3ab3a3ebf420be947962717e00fc5950f836517554c58a406e46769a2ad891fc970ab2e08abd2d899f72a481f749bb32794f2c7dee529ff165e4e2183b9441642143e63e8c7b112e473bdcf75c6111ceded954ccc869170c2d2b1bd8f566765d535d5021258fe2c30c74722fafc0eba0104c8e4151205d1cd08c0171a029d62dd39d5221b25575f61203a0e39f7db99e0935bb2", &(0x7f00000005c0)="580856a310e4a1e409dd33a9c1a8d0026b84d3d3aee3411eb4ad9b0e696967ef173b0e8910eb4de01f51f437d6fa314bf948351774d014b4f6d3e8b9dcb7b369710f5779bd98144972e6ad9db29beab26770e0b4f9ae96879f519a0dc2ee7a9d"}}, &(0x7f0000000680)=0x0) timer_settime(r2, 0x2, &(0x7f00000006c0)={{0x77359400}}, &(0x7f0000000700)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = accept4(r0, &(0x7f0000000100)=@x25, &(0x7f0000000000)=0x80, 0x80000) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x608000, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x2000, 0x0) connect$rxrpc(r6, &(0x7f0000000440)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x6, @remote, 0x200}}, 0x24) r7 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000480)=@ccm_128={{0x286}, "db5dfa87c6415424", "349d4fa2c688efe8229a77356ad9c0eb", "90cb1ac6", "96e5d7636535b32a"}, 0x28) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x0, 0x20000}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="af3acb58fc1dea95fd3234c06f11f417"}]}}}]}, 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000001100010400000000000000000200005e0b7300", @ANYRES32=r9], 0x2}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@empty, @in6=@local, 0x4e21, 0x7, 0x4e24, 0x1a6e, 0xa, 0x80, 0x0, 0x3a, r9, r10}, {0x1, 0x2fb, 0x4, 0xffffffff, 0x2, 0x10001, 0x6, 0x4}, {0x0, 0x7, 0x5fd1, 0x3}, 0xce, 0x6e6bb8, 0x1, 0x1, 0x2}, {{@in=@remote, 0x4d2, 0x3c}, 0x19ecc4867b86482d, @in6=@mcast2, 0x3501, 0x3, 0x3, 0x9, 0x4, 0x3, 0x9}}, 0xe8) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000180)={r3}) r11 = syz_open_pts(r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) ioctl$TIOCSETD(r11, 0x5423, &(0x7f00000000c0)=0x5) 01:37:30 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x100, 0x0) socketpair(0x10, 0x1, 0x7, &(0x7f00000000c0)) ioctl$UI_SET_KEYBIT(r4, 0x40045565, 0xb8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) inotify_init1(0x100800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f00000001c0)={0x10, 0x3510}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x10}) r8 = syz_open_pts(r7, 0x0) write$P9_RCREATE(r2, &(0x7f0000000000)={0x18, 0x73, 0x1, {{0x2, 0x1, 0x1}, 0x9}}, 0x18) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000140)=0x19) 01:37:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x344, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc000008}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="aff984066d2427e68eb5e8ff1689534619efe0731bcac6dddb48dc458536a9c6813327a1e911ee5459e32be9c9ef0a42d294cda5ea32ec8a20c136a7859e685fae5ade67445ae0996f698d3f7a8b97d644343c895cf9aa44845b6ab3fd01e2422965e9863dfc08009600", @ANYRES32=r4, @ANYBLOB=' \x00r\x00\b\x00,\x00', @ANYRES32=0x0, @ANYBLOB="14008c00f0a8e62b654e088d297c590c36f48fbcc400730008002800ff00000068001800c7d9ebf0cc2e60ab014df23ac741b2e7ea8f4a28bf967cd49ebb869109b6091e32b1733a0de9fd9bc01ed8513113022077f1161d5c25495ca53fbb0ed3e234f84952b94174b165da5d1d3b8155f692e792bfdf6e4e3ae6f4fba100106ae10e51d18cf00008004200", @ANYRES32=r5, @ANYBLOB="521820a08bbc39db493eac0e4afb51e5a3bd507781f0d6d765521170140c73f8a2977af15988cb51ce5a5b4cb75113ec885ea33bdb39b623d0cbe3b533c362978631dc785c8200000024"], 0x13e0}, 0x1, 0x0, 0x0, 0x4}, 0x20008005) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000060a46834403959a6b83050f25a20ff8e8c4aad4ead52e6de15f5cfeae3d91a3b5694c62845b116d036cbdbd4edf1ff70530df5fa9c2695b3955025b16e0b02c5f9109efebd4b6dd022233450ba0d5ed83bb0d4cb6dea6bc50a051f345aff66de7ff66bef5c871829535007a5f2df4bc5d4e919c53234d05e9decc33dc811b5bb12c1cea2a65de6a2421ca1de9ecbc1256900efb28163f2e700d0d9b9364753ca1986a791d97d7e3f20f14c41df3358bd4b227547eee2ba39e578151817f0514a0ac4b84759ad1d7132ffde6dff4a55", @ANYRES16=r6, @ANYPTR], 0x3}}, 0x40000) open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x100) 01:37:33 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000000)=""/37) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:33 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:33 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x11000020}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xdac, 0x8000, 0x7, 0x8}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1000}, 0x20000000) [ 1556.569341] selinux_nlmsg_perm: 38 callbacks suppressed [ 1556.569352] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 [ 1556.581770] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 01:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_PRIORITY(r5, 0x80045643, 0x2) r6 = dup3(r0, 0xffffffffffffffff, 0x80000) timerfd_settime(r6, 0x2, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, &(0x7f0000000180)) r7 = syz_open_pts(r2, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=@ng={0x4, 0x3, "6f7a3ea02e7c33ea8eae1787e8eb16ad77fef5"}, 0x15, 0xfc5ec302778c6061) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x5) [ 1556.634685] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 [ 1556.664098] hfsplus: unable to find HFS+ superblock 01:37:33 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1556.708780] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 01:37:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x37, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7597) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:37:33 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000000)={0x6, 0xf17, 0x6}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r4, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1556.775873] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 01:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x614c40, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_XCRS(r5, 0x8188aea6, &(0x7f00000002c0)={0x0, 0xe2}) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) [ 1556.845892] hfsplus: unable to find HFS+ superblock [ 1556.873579] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 01:37:33 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1556.912757] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 01:37:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept$netrom(r4, &(0x7f0000000140)={{}, [@bcast, @bcast, @remote, @default, @netrom, @null, @null, @netrom]}, &(0x7f0000000200)=0x48) getpeername$netrom(r5, &(0x7f00000000c0)={{}, [@default, @bcast, @default, @remote, @remote, @bcast, @null, @null]}, &(0x7f0000000000)=0x48) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1556.953311] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 [ 1557.014860] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 [ 1557.037561] hfsplus: unable to find HFS+ superblock [ 1557.070475] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16283 comm=syz-executor.5 01:37:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175a", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0xd8, r10, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x62}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x7fffffff}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8000}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x8000}, 0x8010) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_TRY_ENCODER_CMD(r4, 0xc028564e, &(0x7f0000000000)={0x4, 0x2, [0x9c3, 0x8001, 0xad5, 0x8000, 0xc2c, 0x3, 0xaf7d, 0x10000]}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:36 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)) 01:37:36 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1200, 0x0) ioctl$sock_proto_private(r1, 0x89e1, &(0x7f00000000c0)="dc86b235493cb93d70c4ef48e965d4eb6190afaaaad626b577d318ecde531c1a06e0e15e87e6d59d9cad285065d6ef1c3c6ab8eacf74e67dae0588847fcf8e29fde3c3e25734e4fd571f3982ae723c579e4343535f985e45a3aab103158585dfc07bea315e8b2a6f2f60ad45545374f01caa0a8af9150e1bf898dd34ee6eb1a6041983ef581018c9bf52f9da662ca27ca542c29eac2c77eb2284440fa2899f71ae597691e926b36bbddb683982a6f3cd0bcc03ca1c8ddb41efccac3738d1f8b0260a0871315683") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, &(0x7f0000000300)={'icmp\x00'}, &(0x7f0000000340)=0x1e) recvfrom$x25(r4, &(0x7f00000003c0)=""/149, 0x95, 0x20e0, &(0x7f0000000480)={0x9, @remote={[], 0x1}}, 0x12) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') prctl$PR_SET_PDEATHSIG(0x1, 0xf) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r6, r8, r9) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="7ddf000700"/14], 0x14}}, 0x0) 01:37:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xc8, r5, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb64}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}]}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1559.833552] hfsplus: unable to find HFS+ superblock 01:37:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x101, 0x10000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgid(r7) 01:37:36 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)) 01:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0}, &(0x7f00000018c0)=0xfffffffffffffe67) setuid(r1) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='auxv\x00') ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r3, 0x40184152, &(0x7f0000001800)={0x0, &(0x7f0000001780)=[&(0x7f0000000100)="d73c464f1a5ce6e67587d4e222add5bb4bd84db15df92347fa05554cfeab24e58b23a004cc8f0c7c20822ab022c4f5b284620ab965eaf86503ae96dbb051e587f9284b667ea01a9817d71a51f61f005d31950a63637cfc694b932000a12cce408fce4e409f196fe183b315046b02183f0594ee131ff407edc36fc2c45435c2d928e7a7916702a2d2f01f24e17c29035474682ef30e2ca824ddd364138e79e67f4994980789c161eed8a571995bb6d0fec7f7", &(0x7f00000002c0)="7d73c32a4dc18d9b3e10d8af787ba7d5d614baa38b880e0065e268acb8bdea325283dc07af8ce54873e6932be4c587a87c7cf54f8a49db0bf46c904b6f729849f745bd1d603c945591e97b44accb67f7e6e10f230b90bb2e477b6e490e0faf82b92be598bd8cd7839e9ae97438af418fc45da4127ce2613c8bd5384a1947b758bb57d43263943d3c6df5750369967d74678b0e68f5f1714a379fd737b35d37f63e1e89c3f4d962cf55ba276c55e67a8da7aa315ebdeabc49", &(0x7f00000001c0)="adba4fa56b83dd9c873b830d269d9a3e", &(0x7f0000000380)="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", &(0x7f0000001380)="86c104d72c16ba226a92ba66154d96c63b5a5fbd3dece1a006c484018c3a904b4633d381b08f8c57060eae29bd4aa38d02a3d95abae407d931f01b988f0df558d1b24eaa6b9d6d976e9f22d754fbc6b118a1782784363fc94e179cb99b99a93a0406f34a79d260d521a9007b628ecb714f02fb27ee0f61417089680f3d5b39adece12b323a52409443e68d79e020504771741f5862a99284b668b220e72d744530097ed11f93712005", &(0x7f0000001440)="c45c6765116dd9ad426ad02d02081eb70abaaadd2061bbb862f094da5a639a2f28ff64f05e133759333c9a752f809c5f92294d702dd7373f0f4829a9f935a977c9770a55150ebcee5dd07eab5ff6a24b005efbba82164f2b2c74955f7a7302f6d16fa11e5b1ae514e3a2075ff8be2c01bc6c652b2ac9de68703f6f82604864203793e8331ff478d785dbc663520d1af22bf5e40e3cf09b4d7b206dbe2b8e00", &(0x7f0000001500)="0a27100e1d6974d5ed496dd7f0713e9036511445f232a2dc73a56ebbaf1e1722f3aaf81d876687a6b90b85040d5b274d51ffc4cb434c170b67eade710e9d9f7e84249ab805552540a3c972b509ad4acae1eb2796e741", &(0x7f0000001580)="1a160c0601d2f351d1848edfc82986dd18ea73b808f557310bf66cac3b4531c58888ded2f6a280dd0d3f6ff95426b8d7bd324dc822b560c7f80601c47e340f0d724fea79c49ab1c1a8bb8adbf942af476bb0fb2c2be74899c48e2393b0d07411c4f53aa9db8d4d83a4e2d430b30ff4bf2adc07c79312fad725ba487a2187ee2c9373b29442255fa3d76a717cb635ff5f93a875d6a13c5d1bb860bc3d4483b6fe9f797e3192f98539503e15191cdf457c7b295bc70c4dab0091e914e649802ff757db283d05bed55672ac73", &(0x7f0000000200)="837c796af3bc3b59a76e3addcb9f38f514fec01a342dcaa5cbdb53a39e26fd", &(0x7f0000001680)="98dbf90a9daa95d755d7e96271f292d71168948c5ea8117cf98ca0be6c789ecc1931b2c5a19b7c2e55d878d9599b895cffc1ebef1b97c0c9800df2949a4aa7733511f0ed0f52db2dcaee6ba233a7664d1ba3c0c7a94306a8386c25592727c694c4db020b61f20ff7f1b2395cfa8cb3d04c6c599af1884eadab3267d0d61ba1a214cc13f2b495382aa4059e8c93a4a3cf1a8e7636f09377eb3538f1a1ae5e21645b141012276c72d0d1aea2b18bff5ea958c952eda01946b331c71cab9a1402625e951cca32f0f43fbb678d41469174a5f7ee2b52987ceeca5cacce28caec878ef016082a"], 0xdc}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000001840)=0xded0, 0x4) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000040)) r5 = syz_open_pts(r4, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000001880)={'veth1_to_bridge\x00', {0x2, 0x4e22, @empty}}) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40042409, 0x1) 01:37:36 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf00000000e0ffffff05000000230b14c5e5be178526aa3b09913d49ef14be13aba4b126a6e8f191ba3fc76d435fd7f8e673526fb3b86bd034053cfbcd0e54aa956a7b79590c6d4f9c503b314f2929638cab0e8ef8ca12"], 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000100)={'veth0_to_bond\x00', 0xfff}) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCSIFMTU(r5, 0x8922, &(0x7f0000000000)={'veth0_to_team\x00', 0x2}) [ 1560.084725] mkiss: ax0: crc mode is auto. [ 1560.109030] hfsplus: unable to find HFS+ superblock [ 1560.219704] veth0_to_team: Invalid MTU 2 requested, hw min 68 [ 1560.300939] veth0_to_team: Invalid MTU 2 requested, hw min 68 01:37:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175a", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x5) 01:37:39 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)) 01:37:39 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) init_module(&(0x7f0000000000)='/dev/ptmx\x00', 0xa, &(0x7f0000000100)='/dev/ptmx\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x1}, 0x10) 01:37:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xa00, 0x3d2f}, 0xc) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1562.944655] hfsplus: unable to find HFS+ superblock 01:37:39 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000000c0)=0xa8, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000bb", @ANYRES16=r2, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) 01:37:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000100)={0x0, 0x0, 0x5, 0x6}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000000)=0x7f) r5 = fcntl$dupfd(r1, 0x0, r0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000040)) r9 = syz_open_pts(r8, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) [ 1562.978790] selinux_nlmsg_perm: 38 callbacks suppressed [ 1562.978807] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.011800] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 01:37:39 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session'}}]}) 01:37:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$selinux_create(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='system_u:object_r:dhcp_stateit:s0 unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 00000000000000000004 ./file0\x00'], 0x6d) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) [ 1563.047324] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.133601] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.163061] hfsplus: invalid session number or type of track [ 1563.169023] hfsplus: unable to find HFS+ superblock 01:37:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_SIGNAL_MASK(r9, 0x4004ae8b, &(0x7f00000002c0)={0x1000, "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"}) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x20, @local, 0x8}, 0x1c) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x0, 0x0, 0x40}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) [ 1563.184317] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.247419] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.297397] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.328284] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.346410] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 [ 1563.380690] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16415 comm=syz-executor.5 01:37:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175a", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:42 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session'}}]}) 01:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000040)=@framed={{0x15, 0xa, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}}, &(0x7f0000000400)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1D\x90Cy\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qV\xf5\x9d~\v\xd0\x01\xddnDc\x81\xce\x98pay\xfeE!W\xc6\x9e\x8d~\x98\xd1\x11\xee\xf9\x87\x15\x04\xd4\a\x05\x8dr\xdb\x06\xc4\\\x10\xb5PQ\xdb\xa8^\x13[\x15y^\xd1\xffq\xaaO!\xe1IB\x16\x94\xd7\xe7(<}r\x97\xc3,=\xf2\x7f\xe9F\xd6\b!\xb8H\x90c-\x9c\xa57\xc0\xb2vm\x18\xb5\xf9>\x10\xfb\xf3\xa3\xe9\xcd\xca\xc2\xfe\xcfh\x86\x99}\xeen\x1f\xaf\x9c\xf4_\f\x91\xc0\x89\x82<\x8bS|\\t\x16\xda.\x85\x88\xaf\xfe\x8a\'-\xdc\xcaZ\xc4\xd2\xc6\x12\x98\xa5\xdc\xcb\xdc\xe4\x84\xd7\xe9i_\xeb\xa0|\xda@e\xcd\xb8\x12s\xe59z\x81P0\xab\xf4$4\xb4\xc1yI\xc6eU\x92L\x94\xbdG_+\t\xcfp\x11\xa8\xabt\xad\x89\xef\xa9y\xe0\x89', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x30a}, 0x14) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) fcntl$setpipe(r5, 0x407, 0x0) 01:37:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffd53) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8080, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)={0x0, 0x10000000}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) r4 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000180)={0xfff, 0x20, 0x7fff, 0x3, 0x2, 0x80, 0x1f, 0x3f, 0xfff, 0x5, 0x4, 0x2}) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f00000001c0)="1accb8a28d4ec05e07bfa731c4e461107d4f981f4063214684e389677f407cddc88d12dfcf82a3b9c29e8b6966d5f76a3671aa105d98eb9c29001501653cfdad197aedca09c95fb54c8a991d798ff2c9778e5064947d704ec4a80ba9d927b9f98bbeb2aaf0747a47a676b02de59cdf51ae61b4eac0097fb50b21aa6fbf2659180ad810d5382bad8603a702f0a74e0b5c89d87a1cd94c8d2ac51020e5542088b4fd04b973c8430d1f565ed2e2616285f958e6c4975a3c2c369d621de20a") connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x609c08521c264455, &(0x7f0000000100), &(0x7f0000000140)=0x4) 01:37:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000180)={0x0, 0xe8f}, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$CAN_RAW_ERR_FILTER(r8, 0x65, 0x2, &(0x7f0000000000)=0x81, 0x4) r9 = syz_open_pts(r5, 0x0) r10 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r10, 0x1, 0xf, &(0x7f0000000600)=""/4096) semctl$GETVAL(r10, 0x4, 0xc, &(0x7f0000000100)=""/88) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x5) 01:37:42 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1566.064433] hfsplus: invalid session number or type of track [ 1566.098279] hfsplus: unable to find HFS+ superblock 01:37:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000000)=0x4, 0x4) r6 = syz_open_pts(r5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000100)=0x8) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:42 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session'}}]}) 01:37:42 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7ddf0000000000000000050000006bb03ab6592c8b327b19ecd25685d28b84e0423f771b33ba6477398750c7ed55d614f6241de9b6c50c5b64bafbacc60180e47da8370b995fd4a5562aab6cbbd5f1a3631b95aabb0cf054ab92b0c60564dafc6320f9c49f0d6948e60ddd104ecdff4a6a777f9d"], 0x14}}, 0x0) 01:37:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TCSETS(r11, 0x40045431, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x5}) r12 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r12, 0x5423, &(0x7f00000000c0)=0x13) [ 1566.334775] hfsplus: invalid session number or type of track [ 1566.389410] hfsplus: unable to find HFS+ superblock 01:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r2, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x1}, 0xc) 01:37:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast, @empty, @multicast2}, 0xc) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0xca01664f4cc01206) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1, 0x5) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 01:37:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:45 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) io_setup(0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000100)='./bus\x00', &(0x7f0000000280)=""/27) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) keyctl$invalidate(0x15, 0x0) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7dd1000000000000000002000000"], 0x14}}, 0x0) [ 1569.162914] selinux_nlmsg_perm: 38 callbacks suppressed [ 1569.162928] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 [ 1569.187256] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 01:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d, 0x0, 0x25dfdbfd}, 0x14}}, 0x800) 01:37:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x6, 0x80000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) pwrite64(r5, &(0x7f0000000100)="824fcc7843f91b989e4088518190499a638943631141fe823a35b137588807a4213a3b621b89d64425147a5e359a67e83f42f51ffcc5abd52e3629b2dc4ad41e13a26a4ec4ea7770fc9d21b0229f90929c90bade050a01865b4a14870db81d4974d49581aaaed4261da822079f73608f0daba985863507", 0x77, 0x7fff) syz_open_pts(r5, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, &(0x7f00000002c0)={0x3a, [[0xfffffff8, 0x9, 0xff, 0xda, 0x5f3, 0xb422, 0x8, 0x1], [0x100100, 0x1, 0x5, 0x7, 0x6, 0x200, 0x2, 0x1], [0xff, 0x2, 0x6, 0xe3, 0x7f, 0x513, 0x1, 0x1]], [], [{0x3b3e, 0x2, 0x5}, {0xde, 0x2, 0x3ff}, {0x400, 0x3f, 0x6}, {0x1, 0xffffd9c1, 0x200}, {0x81, 0x5, 0x9}, {0x3, 0xc2cc, 0x3f}, {0x1, 0x3ff}, {0x0, 0x1, 0x7}, {0x2, 0x3f, 0x3}, {0x8, 0x1, 0xdf}, {0x3, 0x8, 0x1}, {0x8000, 0x7943016, 0x77a}], [], 0x8}) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) [ 1569.274574] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 [ 1569.319153] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1569.339403] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 [ 1569.360944] FAT-fs (loop3): Filesystem has been set read-only [ 1569.367377] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1569.377356] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 [ 1569.398068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 01:37:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000080)) [ 1569.413203] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 [ 1569.432026] mkiss: ax0: crc mode is auto. [ 1569.466054] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 01:37:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r2, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) recvfrom$inet6(r2, &(0x7f0000000100)=""/140, 0x8c, 0xedf9c8f37c9e9f1e, &(0x7f0000000000)={0xa, 0x4e21, 0x7f, @local, 0x401}, 0x1c) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x5) 01:37:46 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, '\x01*h\xe1\x8d\x00', 0x0, 0x3fc}, 0x40e) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) [ 1569.511817] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 01:37:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000000)=[0x2eec, 0xb88]) [ 1569.594822] mkiss: ax0: crc mode is auto. [ 1569.615658] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16518 comm=syz-executor.5 [ 1569.877996] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 1569.915652] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (32 blocks) 01:37:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00\xad\x0f\rcJ\xf9\xd0\x1c\xc4\xbf\xf6.w\x03\va\xa3\xb6\xd8\x99Pv\xffi\x00FV6\xddx\x9bP.\xbf\xa5c\x8d\xab{6y\xcb\xd0\xf3L\t\xb2\x05\x941\xd4\x13%\x96/\xd3-\xb6]IO&\xe1kd\xae\xd8\x9d\xa8\xa1h\xeb\xacRo\xcc\xf4\xb6\xde\xcd4\x85\xc7\x9a-\xc3.\x12T\xf3\x9cYU\x95\xf0\xbe\x1e\xdc\xb8\xa1\x8b\xfe\xa7j\x92r\x81\xc2\x17\xfe\xa6\t\xf4R?\xba\xd1b\x96\x8by\x04\xaen\x02\xedtw]_\x98\xe9\xbf-V\xdd|\xad\xb9\xe1\x02>|D\xae?\x01\xfeL\x05a\xa3\xb4[\x95\xb3W\ntF\xbd\xf4\xa7\xd4\xa5\xaa\xdd\x9e)\xf2\xd2\xc6\xcco\xf2u\xee\x85\xc2\x88\xc1\xb0I\xc5d\n\xa9\xdbt\xc0\x93e\xcd|+j\x97\xdf\xdfC g\xdf,\xc2\x88\xc4>\xd8\xa5N\x06\xd5~\xd8') sendfile(r0, r0, 0x0, 0x4eba) 01:37:48 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9f6d595f760c292414000000bec5db2c8f49d23447eca5569a029e8ca75e80af4adb71821d3bb09aed0cde7ad2dbe636b7dae2f68ce662e4484ee7ba1a78a56c2f524a8c6ebb5fd9c93b04bf9f08bd0263be75084a23a39096cb1e240e2e900a7ede2033ca14d68add587d292d673880d0e08cbd97f1164cf04ad5e7c3092dc78070b17e9a2b28628d47b358331829e6c61c2e5ad5f5f39ccd4eed1422dcc0bef1daa4c5dc9c4075", @ANYRES16=r1, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) 01:37:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) r5 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) 01:37:48 executing program 2: open(0x0, 0x141042, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x60300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3008}, r0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x20600, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000140)) r2 = getpid() tkill(r2, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010001fff00c858734400000000000000", @ANYRES32=r8, @ANYBLOB="00000000000000001c0012000c0001006970366772650000", @ANYRES32=r5], 0x4}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 01:37:48 executing program 2: open(0x0, 0x141042, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x60300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3008}, r0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x20600, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000140)) r2 = getpid() tkill(r2, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010001fff00c858734400000000000000", @ANYRES32=r8, @ANYBLOB="00000000000000001c0012000c0001006970366772650000", @ANYRES32=r5], 0x4}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) [ 1572.356925] Unknown ioctl 8818 01:37:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703d534000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90b0c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d1e4841d39c56649188e4deaed4927806cf07890ca28f51bc2ef34c37e91f6bfc371e65316771570000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x1, 0x0, 0x0, 0x20, 0x1, 0x7ff, [], 0x0, r1, 0x0, 0x4}, 0x3c) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904025b65ef0b007c05e8fe55a1bc000b000200142603000e12050000000000812fa800080004001000e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) recvmsg(r3, &(0x7f000000c200)={&(0x7f000000b040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c180)=[{&(0x7f000000b0c0)=""/131, 0x83}, {&(0x7f000000b180)=""/4096, 0x1000}], 0x2, &(0x7f000000c1c0)=""/6, 0x6}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000c240)={0xc, 0x81, 0x4, 0x334, 0x140, r2, 0x8, [], r4, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) r5 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r5, 0x29, 0x11, 0x0, 0x300) recvmsg$kcm(r5, &(0x7f0000001440)={&(0x7f0000000d40), 0x80, &(0x7f0000001340)=[{&(0x7f0000000dc0)}, {&(0x7f0000000e00)=""/227, 0xe3}, {&(0x7f0000000f00)=""/157, 0x9d}, {&(0x7f0000000fc0)=""/122, 0x7a}, {&(0x7f0000001040)=""/169, 0xa9}, {&(0x7f0000001100)=""/154, 0x9a}, {&(0x7f00000011c0)=""/200, 0xc8}, {&(0x7f00000012c0)=""/76, 0x4c}], 0x8, &(0x7f00000013c0)=""/107, 0x6b}, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0x2, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @jmp={0x5, 0x0, 0xd, 0xb, 0x3, 0xfffffffffffffffc, 0x8}], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x7f, &(0x7f00000002c0)=""/127, 0x41000, 0x3, [], r4, 0x0, r6, 0x8, &(0x7f00000004c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x4, 0x7, 0x6}, 0x10, 0x0, r7}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\xf6', 0x1ff) sendmsg$kcm(r7, &(0x7f0000000d00)={&(0x7f0000000740)=@llc={0x1a, 0x6, 0x3, 0xc2, 0x80, 0x20, @remote}, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000007c0)="48804a5097bab64760d070f8bd81f09868bdd14dd1e3abc1d5360fdf1ef11ba6bd334610c70992df53f61abbe7712721b116e9847dfed861baa841c3315d05ac027932cd688707a5c467ece92d31539e8db3fb27978ea61bdf71ecb9d1157a665362b08d92747a0c6424f4c60ac6e9fd340bc863f9e065628f0b0739b6be9998722a72b6915308f3b72f62b4d1059fdfcccfa873d033ff132d177a609d18a74bf59cfeee902f5ccc2afc71b2bc1396879c078f652d45a03581aa8b9960e58a30fda42ed5e43accb1b2ed704b9e8b", 0xce}, {&(0x7f00000008c0)="a573a6a6f23b0b2cc447aec8e0d5440acb2772c5a78baea76c04235303b055a7a9f25f5540df95266349d2ff1afe87110c414a27187cd379f65d4c6d6aa84a7c9d126e0e091eddb51adc3dc3e85ba583070c9c0fff062c26e8c4da0c2f8584f011f3692008bd5efb45a6271f4ee578a1d2d418db76557dd049b4aca6440f4a14d03ca4fcbf30bf7d4c11dc92dcd99ec19cd7e005bde8f19236882c3267d1e3ac6ba572b9af80cde6ed9ddaa4fccce8fd3702378aa8ca07606d32d2a39cd4a9aca763d95c32a9f8d6e61aec936fc65d11e0c4628437c6afba7d6065e4c677bd01301703cba29e2ea18ba0b2bdfa2368ee034b1c", 0xf3}, {&(0x7f00000009c0)="0c0097d827eeef89ed1fe84dbbbd9420376faaa2045f3ca11932f5392be296406f6e56b1118f8c2b53d9ed5f2ba95765f3faf2c9db8e8d2b6dcecc8fa080404f6763fb78d1befe4dca3f96ab5fb168235da33863202939cd93a0f52a6c62ba7923d731e8a6f65254d3606f9a5ff0155150b81f1513527b35d40bcd573ebdd0aca1bc28417277531c4140be23aefed2", 0x8f}, {&(0x7f0000000a80)="a2b1e8d69f1257ca5e21d35eb2079090ee45cf5e8374425c93e9a8c4b17fbe27a216a61d4e0d", 0x26}, {&(0x7f0000000ac0)="7c6d7b4c8fd4c300a9854bcc1e7efee6bb8035620a84b0a130642fa848d622de74cc6064d76e60c3d0471ee60e53110d075bf02b52a521a736317b5e2dca1fb2bea97845ae02539652aa78a6f85774b66745fc7ae01f1708d18ee68887fc18929fde0fc587d766d15e740aff1b6de8db680a5ee1aa6d87e8b74f2936d821efd7dbf05a05238ff06ba485ef2514c8755d31bce52176d012ee94d8b6482e4b6f6d6c8f997d19d54b148301acc8aec138139bd05e9dc6a6e81fe0b087cc965e9f87e25f077bc3f8bdbd42681603d0dc7dfd2dad7f9c66d30406fa418c76da2d4e81084ac77aa69fc884ef1e537ee98ff5ddcd30dc", 0xf3}], 0x5, &(0x7f0000000c40)=[{0x80, 0x29, 0x9, "30f9a8cadda5a6ec7c23d6a3d3fea10a5c9c7538ab8a1a6a28c8d33145bf50d3ff96f68be0dace654ed7a83ef35ca75e82718c912355ba72a06223f785cff0e9ed0d19d81ce4dca9d369994d42da36c4247759f91295eff070f7a6458ef58f77eef1edc681418c49da"}, {0x28, 0x10d, 0x9, "b8be5ebd81bef1e3d05d2d4dac3ded4124"}], 0xa8}, 0x2000040) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400, 0x0, 0x0, 0xffffffffffffff17, &(0x7f0000000380)="346610fafa5d6984a36d2d41226581a813fcb43ce01c32109ee0b12a547ae2f70719c216f1629c5c8667f3e2064b2b35fd422921ceac82f11f7b1b2614c73e1bf77e7bc4170ed6f2b5c8068f4a3742e1e828fdd6e181063e9e6ae0b7eeace4a4ae6c300a77bb81294e1c2326ba329d822b70e4503626bc3f4c4788da6efcfa94fe0e4528088f8cefd5d38363876cb91c8b54835e9de837840aaca10ae977446cda32755aa2adc2118553bf84b2a786084857b05ceada8aaaff7074de246013d489f49f2244ae9ad85a87e7d7c60eed752dbedab3ddf0a29dcb7686103d8b4a75a6acb33b1c1dcea2ceb9914d9c652af8afa3837b2152340e28", &(0x7f0000000280)}, 0x28) 01:37:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a7ffffff", @ANYRES16=r1, @ANYBLOB="7de02bbd70000000000005000000000001006e657464657673696d000000000002006e657464657673696d3000000000030000000000000001007063690000000200303030303a30303a31302e30000000000000030003000000000001006e657464657673696d000000000002006f657464657673696d3000000000030000000000000001006e657464657673696d000000000002006e657464657673696d30000000000300010000006dba5aac8e633e4f23a08d31a6c4151329524e881f9183085e75c62779cbf43360bdcb2b6f0edeb8686b03db0a3bfb3779a4c2ee92133fbb8a9215af604c24b32719"], 0x14}}, 0x24000080) 01:37:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r3, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000006c0)=0xe8) sendmsg$inet(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000100)="8730c68620d71b6984bee404bdec491f5a49d31f867536b44c221734bc26e5c8397aa0192e17fef66e5a0b71e7713f1f62a93199e67bf69eccb6d635a4039a85e99126be80f68e4e5b2aa692edc27c9520a6011f873cbc0e97c77378be0b0345eac4cf65666375012a007347442bee872d94c4fede7dc21429b94276098986ab0cea8363035db07fd861be7d7e", 0x8d}], 0x1, &(0x7f0000000700)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x800}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @loopback, @multicast1}}}, @ip_retopts={{0x30, 0x0, 0x7, {[@ra={0x94, 0x6}, @timestamp={0x44, 0x18, 0x1, 0x1, 0x1, [{[], 0x7}, {[], 0x1}, {[], 0x6}, {[@dev={0xac, 0x14, 0x14, 0x22}], 0x7ff}]}]}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@lsrr={0x83, 0x17, 0x0, [@multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0xf}, @local, @multicast1]}]}}}], 0xa8}, 0x9000) r5 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) 01:37:49 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:37:49 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="04d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1572.567987] Unknown ioctl 8818 [ 1572.692922] ptrace attach of "/root/syz-executor.2"[16624] was attempted by "/root/syz-executor.2"[16626] 01:37:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDDISABIO(r2, 0x4b37) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="7ddf000000000000130005000000"], 0x3}}, 0x10) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x4000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r5, 0x111, 0x4, 0x1, 0x4) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 01:37:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x3, 0x9) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x4000, @empty}, 0xfffffffffffffd48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x5) 01:37:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x1, 0x0, 0x0, 0x20, 0x1, 0x7ff, [], 0x0, r1, 0x0, 0x4}, 0x3c) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904025b65ef0b007c05e8fe55a1bc000b000200142603000e12050000000000812fa800080004001000e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) recvmsg(r3, &(0x7f000000c200)={&(0x7f000000b040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c180)=[{&(0x7f000000b0c0)=""/131, 0x83}, {&(0x7f000000b180)=""/4096, 0x1000}], 0x2, &(0x7f000000c1c0)=""/6, 0x6}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000c240)={0xc, 0x81, 0x4, 0x334, 0x140, r2, 0x8, [], r4, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) r5 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r5, 0x29, 0x11, 0x0, 0x300) recvmsg$kcm(r5, &(0x7f0000001440)={&(0x7f0000000d40), 0x80, &(0x7f0000001340)=[{&(0x7f0000000dc0)}, {&(0x7f0000000e00)=""/227, 0xe3}, {&(0x7f0000000f00)=""/157, 0x9d}, {&(0x7f0000000fc0)=""/122, 0x7a}, {&(0x7f0000001040)=""/169, 0xa9}, {&(0x7f0000001100)=""/154, 0x9a}, {&(0x7f00000011c0)=""/200, 0xc8}, {&(0x7f00000012c0)=""/76, 0x4c}], 0x8, &(0x7f00000013c0)=""/107, 0x6b}, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0x2, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @jmp={0x5, 0x0, 0xd, 0xb, 0x3, 0xfffffffffffffffc, 0x8}], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x7f, &(0x7f00000002c0)=""/127, 0x41000, 0x3, [], r4, 0x0, r6, 0x8, &(0x7f00000004c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x4, 0x7, 0x6}, 0x10, 0x0, r7}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\xf6', 0x1ff) sendmsg$kcm(r7, &(0x7f0000000d00)={&(0x7f0000000740)=@llc={0x1a, 0x6, 0x3, 0xc2, 0x80, 0x20, @remote}, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000007c0)="48804a5097bab64760d070f8bd81f09868bdd14dd1e3abc1d5360fdf1ef11ba6bd334610c70992df53f61abbe7712721b116e9847dfed861baa841c3315d05ac027932cd688707a5c467ece92d31539e8db3fb27978ea61bdf71ecb9d1157a665362b08d92747a0c6424f4c60ac6e9fd340bc863f9e065628f0b0739b6be9998722a72b6915308f3b72f62b4d1059fdfcccfa873d033ff132d177a609d18a74bf59cfeee902f5ccc2afc71b2bc1396879c078f652d45a03581aa8b9960e58a30fda42ed5e43accb1b2ed704b9e8b", 0xce}, {&(0x7f00000008c0)="a573a6a6f23b0b2cc447aec8e0d5440acb2772c5a78baea76c04235303b055a7a9f25f5540df95266349d2ff1afe87110c414a27187cd379f65d4c6d6aa84a7c9d126e0e091eddb51adc3dc3e85ba583070c9c0fff062c26e8c4da0c2f8584f011f3692008bd5efb45a6271f4ee578a1d2d418db76557dd049b4aca6440f4a14d03ca4fcbf30bf7d4c11dc92dcd99ec19cd7e005bde8f19236882c3267d1e3ac6ba572b9af80cde6ed9ddaa4fccce8fd3702378aa8ca07606d32d2a39cd4a9aca763d95c32a9f8d6e61aec936fc65d11e0c4628437c6afba7d6065e4c677bd01301703cba29e2ea18ba0b2bdfa2368ee034b1c", 0xf3}, {&(0x7f00000009c0)="0c0097d827eeef89ed1fe84dbbbd9420376faaa2045f3ca11932f5392be296406f6e56b1118f8c2b53d9ed5f2ba95765f3faf2c9db8e8d2b6dcecc8fa080404f6763fb78d1befe4dca3f96ab5fb168235da33863202939cd93a0f52a6c62ba7923d731e8a6f65254d3606f9a5ff0155150b81f1513527b35d40bcd573ebdd0aca1bc28417277531c4140be23aefed2", 0x8f}, {&(0x7f0000000a80)="a2b1e8d69f1257ca5e21d35eb2079090ee45cf5e8374425c93e9a8c4b17fbe27a216a61d4e0d", 0x26}, {&(0x7f0000000ac0)="7c6d7b4c8fd4c300a9854bcc1e7efee6bb8035620a84b0a130642fa848d622de74cc6064d76e60c3d0471ee60e53110d075bf02b52a521a736317b5e2dca1fb2bea97845ae02539652aa78a6f85774b66745fc7ae01f1708d18ee68887fc18929fde0fc587d766d15e740aff1b6de8db680a5ee1aa6d87e8b74f2936d821efd7dbf05a05238ff06ba485ef2514c8755d31bce52176d012ee94d8b6482e4b6f6d6c8f997d19d54b148301acc8aec138139bd05e9dc6a6e81fe0b087cc965e9f87e25f077bc3f8bdbd42681603d0dc7dfd2dad7f9c66d30406fa418c76da2d4e81084ac77aa69fc884ef1e537ee98ff5ddcd30dc", 0xf3}], 0x5, &(0x7f0000000c40)=[{0x80, 0x29, 0x9, "30f9a8cadda5a6ec7c23d6a3d3fea10a5c9c7538ab8a1a6a28c8d33145bf50d3ff96f68be0dace654ed7a83ef35ca75e82718c912355ba72a06223f785cff0e9ed0d19d81ce4dca9d369994d42da36c4247759f91295eff070f7a6458ef58f77eef1edc681418c49da"}, {0x28, 0x10d, 0x9, "b8be5ebd81bef1e3d05d2d4dac3ded4124"}], 0xa8}, 0x2000040) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400, 0x0, 0x0, 0xffffffffffffff17, &(0x7f0000000380)="346610fafa5d6984a36d2d41226581a813fcb43ce01c32109ee0b12a547ae2f70719c216f1629c5c8667f3e2064b2b35fd422921ceac82f11f7b1b2614c73e1bf77e7bc4170ed6f2b5c8068f4a3742e1e828fdd6e181063e9e6ae0b7eeace4a4ae6c300a77bb81294e1c2326ba329d822b70e4503626bc3f4c4788da6efcfa94fe0e4528088f8cefd5d38363876cb91c8b54835e9de837840aaca10ae977446cda32755aa2adc2118553bf84b2a786084857b05ceada8aaaff7074de246013d489f49f2244ae9ad85a87e7d7c60eed752dbedab3ddf0a29dcb7686103d8b4a75a6acb33b1c1dcea2ceb9914d9c652af8afa3837b2152340e28", &(0x7f0000000280)}, 0x28) 01:37:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) socket$kcm(0xa, 0x3, 0x11) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x1ed, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0xa, 0x80}, &(0x7f00000001c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}}, 0x10) openat$cgroup(r1, &(0x7f00000016c0)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x13, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/152], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f00000006c0)="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", &(0x7f00000004c0)="c8fe35cd9653e3846d905e4e2d4ab496e3751d85db3e831d5974d9cc1093867ce6687f8a5855f9934fd77322c607988f858fc6f3fdee1fc59bd6e690ae5e189a729fccbd5e8a4695a51139ff617c263eb9287c8a12abd3d60cc373589a8b0e2b4017137e1b860f5950d8d508aaff90de2c0a30878f8fc416062b7f9b1bbf59ece3da5a7c5f9c3dbaf0d02e3a4b47f9d2635e102e835547dd63357ff97463727d1a1483c44a1886d5e80812e4a11a6f464e8c699464a1e7431aeb8a172b3eb3f59cb91a423887001039a8a3f327dd261aa98784af1fac37da", 0xcf16dad679852d3f}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0x15, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795eca0000080000000000", 0x0, 0x100, 0xf2ffffff, 0x75, 0x61, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae149", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500000000"}, 0x40) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r6, &(0x7f0000000180)='syz0\x00', 0x1ff) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$TUNSETFILTEREBPF(r6, 0x6611, 0x0) openat$cgroup(r6, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 01:37:52 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0xd0, r2, 0x3ecb7b9d36d9df7d, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '\x00\x00\x00\x00\x81\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x80}}}]}, 0xd0}}, 0x0) [ 1575.507197] selinux_nlmsg_perm: 38 callbacks suppressed [ 1575.507209] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 01:37:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000080)="8c88", 0x2}], 0x1}}, {{&(0x7f0000000200)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x10}}], 0x10}}], 0x2, 0x0) [ 1575.587427] mkiss: ax0: crc mode is auto. [ 1575.637082] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 01:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa0, r1, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="140400e5", @ANYRES16=r7, @ANYRESDEC=0x0], 0x3}, 0x1, 0x0, 0x0, 0xe66126b40c973e27}, 0x10) [ 1575.680336] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 [ 1575.715547] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 01:37:52 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x15e}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1575.745450] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 [ 1575.759918] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 [ 1575.774178] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 01:37:52 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1575.805142] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 [ 1575.840176] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 01:37:52 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ifreq(r1, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_addrs=@nl}) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300250069000007a2e407edab1d055810000000460b8107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x330}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) finit_module(r7, &(0x7f0000000000)='devlink\x00', 0xf0c358beb00a15bb) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0xd4, r0, 0x3ecb7b9d36d9df7d, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xd4}}, 0x0) [ 1575.874453] hfsplus: session requires an argument [ 1575.878073] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16639 comm=syz-executor.5 [ 1575.891494] hfsplus: unable to parse mount options [ 1576.035828] bridge0: port 3(team0) entered blocking state [ 1576.048406] bridge0: port 3(team0) entered disabled state [ 1576.061294] device team0 entered promiscuous mode [ 1576.066435] device team_slave_0 entered promiscuous mode [ 1576.077137] device team_slave_1 entered promiscuous mode [ 1576.083925] bridge0: port 3(team0) entered blocking state [ 1576.089632] bridge0: port 3(team0) entered forwarding state [ 1576.102223] bridge0: port 3(team0) entered disabled state [ 1576.141822] team0: Cannot enslave team device to itself [ 1576.155448] bridge0: port 3(team0) entered blocking state [ 1576.163091] bridge0: port 3(team0) entered disabled state [ 1576.172880] bridge0: port 3(team0) entered blocking state [ 1576.178545] bridge0: port 3(team0) entered forwarding state [ 1576.189044] bridge0: port 3(team0) entered disabled state [ 1576.251243] team0: Cannot enslave team device to itself 01:37:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba0", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) io_setup(0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000100)='./bus\x00', &(0x7f0000000280)=""/27) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)) keyctl$invalidate(0x15, 0x0) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x5) 01:37:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000180)=""/157) 01:37:55 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB='\x00'/14], 0x14}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x400, @mcast2}, {0xa, 0x4e20, 0x4, @remote, 0x10001}, r3, 0x4}}, 0x48) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3110c0, 0x100) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000340)={0x10, 0x0, &(0x7f0000000240)=[@request_death={0x400c630e, 0x2}], 0x44, 0x0, &(0x7f00000003c0)="1846452374dd7bcbaa3d1c8c7b784a9f8338aa0e89d9f242da7dd91a5af761ccae8d483f887b019781042a924eaaf68c7a1c407ac18f32744dba3ae84456ac08b36ebf7f"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) ftruncate(r7, 0xdd03) r9 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$USBDEVFS_SETINTERFACE(r9, 0x80085504, &(0x7f0000000580)={0x1, 0x7}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) fchmod(r13, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r13, 0x4068aea3, &(0x7f00000002c0)={0x46, 0x0, [0x2, 0x6b4, 0x1000, 0x5]}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r9, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x92200002}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r10, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x800) 01:37:55 executing program 3: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ifreq(r1, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_addrs=@nl}) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300250069000007a2e407edab1d055810000000460b8107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x330}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) finit_module(r7, &(0x7f0000000000)='devlink\x00', 0xf0c358beb00a15bb) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0xd4, r0, 0x3ecb7b9d36d9df7d, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xd4}}, 0x0) [ 1578.657242] bridge0: port 3(team0) entered blocking state [ 1578.677558] bridge0: port 3(team0) entered disabled state [ 1578.695585] device team0 entered promiscuous mode [ 1578.713883] input: syz1 as /devices/virtual/input/input14 [ 1578.725442] device team_slave_0 entered promiscuous mode [ 1578.731888] device team_slave_1 entered promiscuous mode [ 1578.751726] bridge0: port 3(team0) entered blocking state [ 1578.757405] bridge0: port 3(team0) entered forwarding state 01:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000200)=@req={0x3, 0x6, 0x2, 0x2}, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x200, 0x8082) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0xc) r6 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r6, 0x40bc5311, &(0x7f0000000100)={0x1, 0x2, 'client1\x00', 0xffffffff80000000, "0c6babcddf8700e6", "023943665d38901be43251b5d4867e8ff57f4d813693ca30ced6a9535cd7a379", 0x1}) 01:37:55 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1578.769330] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1578.780672] bridge0: port 3(team0) entered disabled state [ 1578.787561] FAT-fs (loop2): Filesystem has been set read-only [ 1578.830896] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1578.838467] team0: Cannot enslave team device to itself 01:37:55 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) socket$netlink(0x10, 0x3, 0x0) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x1000000000001e, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffffffab}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)={0x73, 0x2, 0x2, 0x0, 0x0, [{r3, 0x0, 0x689c}, {r6, 0x0, 0x6}]}) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r8) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000040)) r10 = syz_open_pts(r9, 0x0) sched_setattr(r7, &(0x7f0000000380)={0x30, 0x6, 0x0, 0x80000001, 0x6, 0xffffffffffffffff, 0x410}, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f00000000c0)=0x5) 01:37:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000180)=""/157) 01:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00') r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r4, 0x40044104, &(0x7f0000000100)=0x1) [ 1578.916574] mkiss: ax0: crc mode is auto. 01:37:55 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x985b40cabf802953, 0x0) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 1579.076323] input: syz1 as /devices/virtual/input/input15 [ 1579.183751] mkiss: ax0: crc mode is auto. 01:37:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba0", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:37:58 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:37:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)={0x6, 0x4, 0xfff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r4, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:37:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000180)=""/157) 01:37:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 01:37:58 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:37:58 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x210002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000000c0)={{0x33, @multicast2, 0x4e21, 0x2, 'dh\x00', 0x66, 0xfffff001, 0x3}, {@broadcast, 0x4e20, 0x10000, 0x1, 0x2, 0x81}}, 0x44) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r3, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:37:58 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1581.750194] input: syz1 as /devices/virtual/input/input16 [ 1581.765563] FAULT_INJECTION: forcing a failure. [ 1581.765563] name failslab, interval 1, probability 0, space 0, times 0 [ 1581.810474] CPU: 0 PID: 16783 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1581.818439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1581.827808] Call Trace: [ 1581.830421] dump_stack+0x142/0x197 [ 1581.834071] should_fail.cold+0x10f/0x159 [ 1581.838412] should_failslab+0xdb/0x130 [ 1581.842400] __kmalloc+0x2f0/0x7a0 [ 1581.845975] ? __sb_end_write+0xc1/0x100 [ 1581.850077] ? strnlen_user+0x12f/0x1a0 [ 1581.854059] ? SyS_memfd_create+0xba/0x3a0 [ 1581.858316] SyS_memfd_create+0xba/0x3a0 [ 1581.862394] ? shmem_fcntl+0x130/0x130 [ 1581.866724] ? do_syscall_64+0x53/0x640 [ 1581.870707] ? shmem_fcntl+0x130/0x130 [ 1581.874606] do_syscall_64+0x1e8/0x640 [ 1581.878498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1581.883381] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1581.888572] RIP: 0033:0x45a679 [ 1581.891761] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1581.899477] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 01:37:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000000)=0x5) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="7ddf0000000057c6000005000000"], 0x14}}, 0x0) 01:37:58 executing program 3 (fault-call:4 fault-nth:1): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1581.906779] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 1581.914069] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1581.921367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b5b4d66d4 [ 1581.928635] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:37:58 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:37:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1582.052125] FAULT_INJECTION: forcing a failure. [ 1582.052125] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.078410] CPU: 0 PID: 16806 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1582.086355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1582.095727] Call Trace: [ 1582.098332] dump_stack+0x142/0x197 [ 1582.101981] should_fail.cold+0x10f/0x159 [ 1582.106145] should_failslab+0xdb/0x130 [ 1582.110134] kmem_cache_alloc+0x2d7/0x780 [ 1582.114300] ? __alloc_fd+0x1d4/0x4a0 [ 1582.118139] __d_alloc+0x2d/0x9f0 [ 1582.121603] ? lock_downgrade+0x740/0x740 [ 1582.125771] d_alloc_pseudo+0x1e/0x30 [ 1582.129580] __shmem_file_setup.part.0+0xd8/0x400 [ 1582.129591] ? __alloc_fd+0x1d4/0x4a0 [ 1582.129602] ? shmem_fill_super+0x8c0/0x8c0 [ 1582.138258] SyS_memfd_create+0x1f9/0x3a0 [ 1582.138269] ? shmem_fcntl+0x130/0x130 [ 1582.138287] ? do_syscall_64+0x53/0x640 [ 1582.146741] ? shmem_fcntl+0x130/0x130 [ 1582.158634] do_syscall_64+0x1e8/0x640 [ 1582.162519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1582.162539] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1582.162547] RIP: 0033:0x45a679 [ 1582.162552] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1582.162561] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 1582.162577] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 1582.162582] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1582.162587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b5b4d66d4 [ 1582.162592] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1582.257722] input: syz1 as /devices/virtual/input/input17 01:38:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba0", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40010010}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="84000000", @ANYRES16=r2, @ANYBLOB="00042dbd7000fcdbdf2507004e230000140002007465616d5f736c6176655f31000000000800030003000000080007004e23000014000200626f6e643000000000000000000000000800040005000000080003000400000008000400090000001400020073797a6b616c6c6572310000000000000000000000000000000084f518b8647db87f533c050440f0594b3e6ce7b624cc6ace0f10fc2aa5d0ef215876ddee92e016f1c656f95809463059443c7534634301dda94df7816e49657ea8a937c5f6a217e0a2947adb94f2f33f1b6eb0a9dd9e01b867762337b755ee955efc594b9d904dc42221d12678717bd559"], 0x84}, 0x1, 0x0, 0x0, 0x40000000}, 0x800) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f00000000c0)) r5 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x1e8) inotify_add_watch(r5, &(0x7f0000000140)='./file0\x00', 0x14000001) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$RTC_WIE_ON(r8, 0x700f) r9 = getpgrp(0xffffffffffffffff) syz_open_procfs(r9, &(0x7f0000000400)='net/hci\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r3, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) 01:38:01 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:38:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) 01:38:01 executing program 2 (fault-call:12 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:01 executing program 3 (fault-call:4 fault-nth:2): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1584.804657] selinux_nlmsg_perm: 54 callbacks suppressed [ 1584.804671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1584.806570] FAULT_INJECTION: forcing a failure. [ 1584.806570] name failslab, interval 1, probability 0, space 0, times 0 [ 1584.824899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1584.851780] input: syz1 as /devices/virtual/input/input18 [ 1584.871597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1584.882951] CPU: 1 PID: 16825 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1584.891603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1584.901159] Call Trace: [ 1584.903772] dump_stack+0x142/0x197 [ 1584.904792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1584.907419] should_fail.cold+0x10f/0x159 [ 1584.907439] should_failslab+0xdb/0x130 [ 1584.907449] kmem_cache_alloc+0x2d7/0x780 [ 1584.907461] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1584.907475] ? rcu_read_lock_sched_held+0x110/0x130 [ 1584.923032] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 01:38:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1584.923697] ? shmem_destroy_callback+0xa0/0xa0 [ 1584.923709] shmem_alloc_inode+0x1c/0x50 [ 1584.923722] alloc_inode+0x64/0x180 [ 1584.923732] new_inode_pseudo+0x19/0xf0 [ 1584.929738] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1584.931980] new_inode+0x1f/0x40 [ 1584.931993] shmem_get_inode+0x75/0x750 [ 1584.932006] __shmem_file_setup.part.0+0x111/0x400 [ 1584.932014] ? __alloc_fd+0x1d4/0x4a0 [ 1584.932025] ? shmem_fill_super+0x8c0/0x8c0 01:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x4, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x5}}}, 0x30}}, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000680)={0x1, '\x00', {}, 0x2}) socket$alg(0x26, 0x5, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x99118008}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x20, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x80c00c4}, 0x20000000) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r3, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) execveat(r6, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='+)vboxnet1\x00', &(0x7f0000000280)='devlink\x00', &(0x7f0000000300)='nodevppp0[vboxnet1\x00'], &(0x7f0000000640)=[&(0x7f00000003c0)=':trusted\x00', &(0x7f0000000400)='ib\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='!\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='nodev{\x00', &(0x7f00000005c0)='mime_typeppp0:-\x00', &(0x7f0000000600)='devlink\x00'], 0x1000) [ 1584.932044] SyS_memfd_create+0x1f9/0x3a0 [ 1584.932056] ? shmem_fcntl+0x130/0x130 [ 1584.932067] ? do_syscall_64+0x53/0x640 [ 1584.932077] ? shmem_fcntl+0x130/0x130 [ 1584.943197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1584.954638] do_syscall_64+0x1e8/0x640 [ 1584.954650] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1584.954669] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1584.954678] RIP: 0033:0x45a679 [ 1584.954683] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1584.954694] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 1584.954698] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 1584.954703] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1584.954708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b5b4d66d4 [ 1584.954713] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1585.091832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1585.113508] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 [ 1585.132444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16827 comm=syz-executor.5 01:38:01 executing program 4: r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x2000) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/30) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3ba2c72d", @ANYRES16=r2, @ANYBLOB="7ddf000000000000000005000000"], 0x14}}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x80, 0x8, 0x9, 0x622ed3c0, 0x2, 0x3e, 0x0, 0x26c, 0x38, 0x15a, 0x400, 0x36, 0x20, 0x2, 0x110, 0x8, 0x22}, [{0x5, 0x3, 0x2, 0xe57, 0x3, 0x4, 0x6, 0x334}], "418890eb8ef33ed483ad7c28fd8ad260d6716825b23ea415a02930201fca9390441836df3cc91b0ebe9769290302d56f0f0c152c9efb8d295e57f03256f6edd7c7f307e0bb58da2c896bc38a4053ed673663308a8c24dd947760cdcd0e7d0991dd31fef995e11bfb689dc594a8942ad83208db3b317a6eaeba13c42e573833f215fb853a722be33366c6e1c0c2ce28f00b4a36f2850f51b92a2a4d465ca15e2c25ab35ecbaf9bb4dd0cd2ef59a059f70934b18c9ddf350487d9a550cb16e7d86248bdaa6f182c732c33531da5c652a7586b10756f781190abb5bfd996191cf129b3f2def1da5eee1c92f7eb5c3adf6bd04c2", [[], [], [], [], [], [], [], []]}, 0x94a) 01:38:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) dup2(0xffffffffffffffff, r3) 01:38:01 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:38:01 executing program 3 (fault-call:4 fault-nth:3): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1585.304673] input: syz1 as /devices/virtual/input/input19 [ 1585.345504] FAULT_INJECTION: forcing a failure. [ 1585.345504] name failslab, interval 1, probability 0, space 0, times 0 [ 1585.364815] CPU: 0 PID: 16859 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1585.374074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1585.383571] Call Trace: [ 1585.386444] dump_stack+0x142/0x197 [ 1585.390113] should_fail.cold+0x10f/0x159 [ 1585.394306] should_failslab+0xdb/0x130 [ 1585.398316] kmem_cache_alloc+0x2d7/0x780 [ 1585.403009] ? shmem_alloc_inode+0x1c/0x50 [ 1585.407272] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1585.413027] selinux_inode_alloc_security+0xb6/0x2a0 [ 1585.418263] security_inode_alloc+0x94/0xd0 [ 1585.422737] inode_init_always+0x552/0xaf0 [ 1585.427437] alloc_inode+0x81/0x180 [ 1585.432031] new_inode_pseudo+0x19/0xf0 [ 1585.436484] new_inode+0x1f/0x40 [ 1585.440395] shmem_get_inode+0x75/0x750 [ 1585.445518] __shmem_file_setup.part.0+0x111/0x400 [ 1585.450669] ? __alloc_fd+0x1d4/0x4a0 [ 1585.454973] ? shmem_fill_super+0x8c0/0x8c0 [ 1585.459355] SyS_memfd_create+0x1f9/0x3a0 [ 1585.463905] ? shmem_fcntl+0x130/0x130 [ 1585.467957] ? do_syscall_64+0x53/0x640 [ 1585.472119] ? shmem_fcntl+0x130/0x130 [ 1585.476202] do_syscall_64+0x1e8/0x640 [ 1585.480761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1585.485634] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1585.491049] RIP: 0033:0x45a679 01:38:02 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1585.495160] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1585.503292] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 1585.510581] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 1585.518223] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1585.525673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b5b4d66d4 [ 1585.525683] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) dup2(0xffffffffffffffff, r3) 01:38:02 executing program 3 (fault-call:4 fault-nth:4): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1585.664259] input: syz1 as /devices/virtual/input/input20 [ 1585.679223] FAULT_INJECTION: forcing a failure. [ 1585.679223] name failslab, interval 1, probability 0, space 0, times 0 [ 1585.704494] CPU: 0 PID: 16870 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1585.712433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1585.712440] Call Trace: [ 1585.712462] dump_stack+0x142/0x197 [ 1585.712481] should_fail.cold+0x10f/0x159 [ 1585.712498] should_failslab+0xdb/0x130 [ 1585.712507] kmem_cache_alloc+0x2d7/0x780 [ 1585.712522] ? lock_downgrade+0x740/0x740 [ 1585.736640] get_empty_filp+0x8c/0x3f0 [ 1585.748891] alloc_file+0x23/0x440 [ 1585.752452] __shmem_file_setup.part.0+0x1b1/0x400 [ 1585.757401] ? __alloc_fd+0x1d4/0x4a0 01:38:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000140)="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", 0xfc) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/dlm_plock\x00', 0x800, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r4, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r4, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000340)=0x1) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r5, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000e40)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2048}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x14, r6, 0x800, 0x70bd28, 0x25dfdbfc}, 0x14}}, 0x440b0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r6, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2000c040) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r6, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x400}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40040}, 0x20000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x218441, 0x0) socketpair(0x11, 0x1, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x12000) socketpair(0x11, 0x5, 0x2, &(0x7f0000004b40)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = syz_open_dev$audion(&(0x7f0000004b80)='/dev/audio#\x00', 0xdb0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) r22 = openat$full(0xffffffffffffff9c, &(0x7f0000004bc0)='/dev/full\x00', 0x40, 0x0) r23 = syz_open_dev$media(&(0x7f0000004c00)='/dev/media#\x00', 0x3, 0x8100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r26 = fcntl$dupfd(r25, 0x0, r24) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r29 = fcntl$dupfd(r28, 0x0, r27) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x8912, 0x400200) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000004d80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4800}, 0xc, &(0x7f0000004d40)={&(0x7f0000004c40)={0xd8, r6, 0xde02e13f3d09b337, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x46c4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r9}, {0x8, 0x1, r12}, {0x8, 0x1, r13}, {0x8, 0x1, r14}, {0x8, 0x1, r15}, {0x8, 0x1, r16}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xd40}, @NBD_ATTR_SOCKETS={0x4c, 0x7, [{0x8, 0x1, r17}, {0x8, 0x1, r18}, {0x8, 0x1, r21}, {0x8, 0x1, r22}, {0x8}, {0x8, 0x1, r23}, {0x8, 0x1, r26}, {0x8, 0x1, r0}, {0x8, 0x1, r29}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1f}]}, 0xd8}, 0x1, 0x0, 0x0, 0x841}, 0x40000) r30 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x18d, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r30, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1585.761219] ? shmem_fill_super+0x8c0/0x8c0 [ 1585.765563] SyS_memfd_create+0x1f9/0x3a0 [ 1585.769730] ? shmem_fcntl+0x130/0x130 [ 1585.773639] ? do_syscall_64+0x53/0x640 [ 1585.777625] ? shmem_fcntl+0x130/0x130 [ 1585.782224] do_syscall_64+0x1e8/0x640 [ 1585.786124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1585.790984] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1585.796176] RIP: 0033:0x45a679 [ 1585.799368] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1585.810060] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 1585.817339] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 1585.824621] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1585.832072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b5b4d66d4 [ 1585.832078] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:04 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYRESHEX=r3, @ANYRES16=r1, @ANYBLOB="7ddf00000000004c11503d99cd0000000000000022443b40e4e80a3f891d35a0cfdc6787ded1ea95b2d9e10c63a187ef4d384b1d1858f157eecc835dd8a0a25b422c7c1992f9a8692388948ff5cb798d34d0e19cc3d6008327f649bd950169aba3c7975329841ea8ef025cbd6836f84f77c07bf5286a9b34d15511771cf149bb7254c18c9da9000ea9c4798004d636c17765219fca4690a2f6d157ee87aecdab692998908941aba06f92eebeb91421e2489ff6fb834fc7a967f2ef5a68babecfde0396f6"], 0x3}}, 0x0) 01:38:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x2bc}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000000)=0x9) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:04 executing program 3 (fault-call:4 fault-nth:5): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) dup2(0xffffffffffffffff, r3) 01:38:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x84, r5, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10001}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffff80000001}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x8000) [ 1588.085341] FAULT_INJECTION: forcing a failure. [ 1588.085341] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.106379] input: syz1 as /devices/virtual/input/input21 [ 1588.117843] CPU: 0 PID: 16890 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1588.125798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 01:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80680) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f00000000c0)=""/248) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) [ 1588.125804] Call Trace: [ 1588.125826] dump_stack+0x142/0x197 [ 1588.125847] should_fail.cold+0x10f/0x159 [ 1588.125863] should_failslab+0xdb/0x130 [ 1588.125871] kmem_cache_alloc+0x2d7/0x780 [ 1588.125885] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1588.153768] ? check_preemption_disabled+0x3c/0x250 [ 1588.153788] selinux_file_alloc_security+0xb4/0x190 [ 1588.153802] security_file_alloc+0x6d/0xa0 [ 1588.153815] get_empty_filp+0x162/0x3f0 [ 1588.153825] alloc_file+0x23/0x440 01:38:04 executing program 3 (fault-call:4 fault-nth:6): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1588.164306] __shmem_file_setup.part.0+0x1b1/0x400 [ 1588.164317] ? __alloc_fd+0x1d4/0x4a0 [ 1588.164326] ? shmem_fill_super+0x8c0/0x8c0 [ 1588.164341] SyS_memfd_create+0x1f9/0x3a0 [ 1588.164350] ? shmem_fcntl+0x130/0x130 [ 1588.164360] ? do_syscall_64+0x53/0x640 [ 1588.164369] ? shmem_fcntl+0x130/0x130 [ 1588.164387] do_syscall_64+0x1e8/0x640 [ 1588.173813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1588.173832] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1588.173841] RIP: 0033:0x45a679 [ 1588.173846] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1588.173857] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 1588.173863] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 1588.173868] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1588.173874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b5b4d66d4 [ 1588.173879] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1588.293395] FAULT_INJECTION: forcing a failure. [ 1588.293395] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.305192] CPU: 1 PID: 16908 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1588.313096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1588.322466] Call Trace: [ 1588.325063] dump_stack+0x142/0x197 [ 1588.328700] should_fail.cold+0x10f/0x159 [ 1588.332912] should_failslab+0xdb/0x130 [ 1588.336895] kmem_cache_alloc+0x2d7/0x780 [ 1588.341056] ? do_sys_ftruncate.constprop.0+0x35c/0x490 [ 1588.346536] getname_flags+0xcb/0x580 [ 1588.350346] getname+0x1a/0x20 [ 1588.353639] do_sys_open+0x1e7/0x430 [ 1588.357359] ? filp_open+0x70/0x70 [ 1588.361080] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 1588.366449] SyS_open+0x2d/0x40 [ 1588.369728] ? do_sys_open+0x430/0x430 [ 1588.373617] do_syscall_64+0x1e8/0x640 [ 1588.377495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1588.382343] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1588.387543] RIP: 0033:0x414411 01:38:05 executing program 3 (fault-call:4 fault-nth:7): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1588.390728] RSP: 002b:00007f6b5b4d5a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1588.398439] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000414411 [ 1588.405859] RDX: 00007f6b5b4d5b0a RSI: 0000000000000002 RDI: 00007f6b5b4d5b00 [ 1588.413131] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1588.420421] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1588.427697] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, 0xffffffffffffffff) [ 1588.502093] FAULT_INJECTION: forcing a failure. [ 1588.502093] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.513915] CPU: 1 PID: 16913 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1588.521836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1588.521842] Call Trace: [ 1588.521863] dump_stack+0x142/0x197 [ 1588.521882] should_fail.cold+0x10f/0x159 [ 1588.521899] should_failslab+0xdb/0x130 [ 1588.521910] kmem_cache_alloc+0x2d7/0x780 01:38:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1588.521921] ? save_stack+0xa9/0xd0 [ 1588.521933] get_empty_filp+0x8c/0x3f0 [ 1588.521944] path_openat+0x8f/0x3f70 [ 1588.521969] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1588.521980] ? save_trace+0x290/0x290 [ 1588.521994] ? __alloc_fd+0x1d4/0x4a0 [ 1588.522008] do_filp_open+0x18e/0x250 [ 1588.522019] ? may_open_dev+0xe0/0xe0 [ 1588.522033] ? lock_downgrade+0x740/0x740 [ 1588.522044] ? do_raw_spin_unlock+0x16b/0x260 [ 1588.522055] ? _raw_spin_unlock+0x2d/0x50 [ 1588.522063] ? __alloc_fd+0x1d4/0x4a0 [ 1588.522081] do_sys_open+0x2c5/0x430 01:38:05 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 01:38:05 executing program 3 (fault-call:4 fault-nth:8): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1588.522091] ? filp_open+0x70/0x70 [ 1588.522103] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 1588.522115] SyS_open+0x2d/0x40 [ 1588.522122] ? do_sys_open+0x430/0x430 [ 1588.522133] do_syscall_64+0x1e8/0x640 [ 1588.522141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1588.522154] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1588.522162] RIP: 0033:0x414411 [ 1588.522171] RSP: 002b:00007f6b5b4d5a80 EFLAGS: 00000293 [ 1588.534235] ORIG_RAX: 0000000000000002 [ 1588.546037] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000414411 [ 1588.546044] RDX: 00007f6b5b4d5b0a RSI: 0000000000000002 RDI: 00007f6b5b4d5b00 [ 1588.546049] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1588.546054] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1588.546060] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1588.614445] input: syz1 as /devices/virtual/input/input22 [ 1588.680736] FAULT_INJECTION: forcing a failure. [ 1588.680736] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.700428] CPU: 1 PID: 16920 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1588.708350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1588.708356] Call Trace: [ 1588.708377] dump_stack+0x142/0x197 [ 1588.708396] should_fail.cold+0x10f/0x159 [ 1588.708414] should_failslab+0xdb/0x130 [ 1588.708428] kmem_cache_alloc+0x2d7/0x780 [ 1588.720489] ? save_stack+0xa9/0xd0 [ 1588.720506] get_empty_filp+0x8c/0x3f0 [ 1588.720518] path_openat+0x8f/0x3f70 [ 1588.720531] ? trace_hardirqs_on+0x10/0x10 [ 1588.720544] ? check_preemption_disabled+0x3c/0x250 [ 1588.720559] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1588.720567] ? find_held_lock+0x35/0x130 [ 1588.720575] ? save_trace+0x290/0x290 [ 1588.720588] ? __alloc_fd+0x1d4/0x4a0 [ 1588.720600] do_filp_open+0x18e/0x250 [ 1588.720610] ? may_open_dev+0xe0/0xe0 [ 1588.720623] ? lock_downgrade+0x740/0x740 [ 1588.720636] ? do_raw_spin_unlock+0x16b/0x260 [ 1588.720647] ? _raw_spin_unlock+0x2d/0x50 [ 1588.720659] ? __alloc_fd+0x1d4/0x4a0 [ 1588.732708] do_sys_open+0x2c5/0x430 [ 1588.732720] ? filp_open+0x70/0x70 [ 1588.732733] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 1588.732743] SyS_open+0x2d/0x40 [ 1588.732752] ? do_sys_open+0x430/0x430 [ 1588.732764] do_syscall_64+0x1e8/0x640 [ 1588.732773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1588.732791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1588.732798] RIP: 0033:0x414411 [ 1588.732802] RSP: 002b:00007f6b5b4d5a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1588.732812] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000414411 [ 1588.732820] RDX: 00007f6b5b4d5b0a RSI: 0000000000000002 RDI: 00007f6b5b4d5b00 [ 1588.738991] input: syz1 as /devices/virtual/input/input23 [ 1588.741972] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1588.741978] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1588.741983] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) write$FUSE_LK(r6, &(0x7f0000000080)={0x28, 0xfffffffffffffff5, 0x6, {{0x4, 0x3ff, 0x1, r7}}}, 0x28) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, 0xffffffffffffffff) 01:38:07 executing program 3 (fault-call:4 fault-nth:9): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) 01:38:07 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1591.108295] input: syz1 as /devices/virtual/input/input24 [ 1591.109321] FAULT_INJECTION: forcing a failure. [ 1591.109321] name failslab, interval 1, probability 0, space 0, times 0 [ 1591.135819] CPU: 0 PID: 16938 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1591.143753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1591.143759] Call Trace: [ 1591.143780] dump_stack+0x142/0x197 [ 1591.143798] should_fail.cold+0x10f/0x159 [ 1591.143814] should_failslab+0xdb/0x130 [ 1591.143822] kmem_cache_alloc+0x2d7/0x780 [ 1591.143832] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1591.143842] ? check_preemption_disabled+0x3c/0x250 [ 1591.143856] selinux_file_alloc_security+0xb4/0x190 [ 1591.143868] security_file_alloc+0x6d/0xa0 [ 1591.143877] get_empty_filp+0x162/0x3f0 [ 1591.143888] path_openat+0x8f/0x3f70 [ 1591.143900] ? trace_hardirqs_on+0x10/0x10 [ 1591.143911] ? check_preemption_disabled+0x3c/0x250 [ 1591.143927] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1591.143935] ? find_held_lock+0x35/0x130 [ 1591.143944] ? save_trace+0x290/0x290 [ 1591.143955] ? __alloc_fd+0x1d4/0x4a0 [ 1591.143967] do_filp_open+0x18e/0x250 [ 1591.195675] ? may_open_dev+0xe0/0xe0 [ 1591.195691] ? lock_downgrade+0x740/0x740 [ 1591.195704] ? do_raw_spin_unlock+0x16b/0x260 [ 1591.195717] ? _raw_spin_unlock+0x2d/0x50 [ 1591.195726] ? __alloc_fd+0x1d4/0x4a0 [ 1591.195744] do_sys_open+0x2c5/0x430 [ 1591.212228] ? filp_open+0x70/0x70 [ 1591.212243] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 1591.212254] SyS_open+0x2d/0x40 [ 1591.212261] ? do_sys_open+0x430/0x430 [ 1591.212272] do_syscall_64+0x1e8/0x640 [ 1591.212281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1591.212297] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1591.212305] RIP: 0033:0x414411 [ 1591.212310] RSP: 002b:00007f6b5b4d5a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1591.212322] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000414411 01:38:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x853, 0x100000) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:07 executing program 3 (fault-call:4 fault-nth:10): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1591.212327] RDX: 00007f6b5b4d5b0a RSI: 0000000000000002 RDI: 00007f6b5b4d5b00 [ 1591.212331] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1591.212335] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1591.212340] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, 0xffffffffffffffff) [ 1591.386520] input: syz1 as /devices/virtual/input/input25 [ 1591.444505] FAULT_INJECTION: forcing a failure. [ 1591.444505] name failslab, interval 1, probability 0, space 0, times 0 [ 1591.457086] CPU: 1 PID: 16962 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1591.464992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1591.464999] Call Trace: [ 1591.465018] dump_stack+0x142/0x197 [ 1591.465037] should_fail.cold+0x10f/0x159 [ 1591.465052] should_failslab+0xdb/0x130 [ 1591.465060] kmem_cache_alloc+0x2d7/0x780 01:38:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000000)=0x0) tkill(r7, 0x200020bc) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1591.465073] ? trace_hardirqs_on+0x10/0x10 [ 1591.465082] ? save_trace+0x290/0x290 [ 1591.465094] __kernfs_new_node+0x70/0x420 [ 1591.465106] kernfs_new_node+0x80/0xf0 [ 1591.465116] kernfs_create_dir_ns+0x41/0x140 [ 1591.465127] internal_create_group+0xea/0x7b0 [ 1591.465144] sysfs_create_group+0x20/0x30 [ 1591.465156] lo_ioctl+0x1176/0x1ce0 [ 1591.465170] ? loop_probe+0x160/0x160 [ 1591.465180] blkdev_ioctl+0x96b/0x1860 [ 1591.465189] ? blkpg_ioctl+0x980/0x980 [ 1591.465204] ? __might_sleep+0x93/0xb0 [ 1591.465212] ? __fget+0x210/0x370 [ 1591.465227] block_ioctl+0xde/0x120 [ 1591.493111] ? blkdev_fallocate+0x3b0/0x3b0 [ 1591.493125] do_vfs_ioctl+0x7ae/0x1060 [ 1591.493139] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1591.493149] ? lock_downgrade+0x740/0x740 [ 1591.493162] ? ioctl_preallocate+0x1c0/0x1c0 [ 1591.501192] ? __fget+0x237/0x370 [ 1591.501210] ? security_file_ioctl+0x89/0xb0 [ 1591.501224] SyS_ioctl+0x8f/0xc0 [ 1591.501233] ? do_vfs_ioctl+0x1060/0x1060 [ 1591.501245] do_syscall_64+0x1e8/0x640 [ 1591.501253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1591.501269] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1591.514844] RIP: 0033:0x45a4e7 [ 1591.514850] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1591.514862] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1591.514868] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1591.514874] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1591.514879] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 01:38:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1591.514888] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1591.519582] input: syz1 as /devices/virtual/input/input26 [ 1591.598987] hfsplus: session requires an argument [ 1591.629186] hfsplus: unable to parse mount options 01:38:08 executing program 3 (fault-call:4 fault-nth:11): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1591.737959] input: syz1 as /devices/virtual/input/input27 [ 1591.787160] FAULT_INJECTION: forcing a failure. [ 1591.787160] name failslab, interval 1, probability 0, space 0, times 0 [ 1591.799029] CPU: 0 PID: 16986 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1591.806990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1591.816341] Call Trace: [ 1591.818937] dump_stack+0x142/0x197 [ 1591.822577] should_fail.cold+0x10f/0x159 [ 1591.826735] should_failslab+0xdb/0x130 [ 1591.830819] kmem_cache_alloc+0x2d7/0x780 [ 1591.834966] ? trace_hardirqs_on+0x10/0x10 [ 1591.839320] ? save_trace+0x290/0x290 [ 1591.843134] __kernfs_new_node+0x70/0x420 [ 1591.847299] kernfs_new_node+0x80/0xf0 [ 1591.851200] kernfs_create_dir_ns+0x41/0x140 [ 1591.855637] internal_create_group+0xea/0x7b0 [ 1591.860158] sysfs_create_group+0x20/0x30 [ 1591.864332] lo_ioctl+0x1176/0x1ce0 [ 1591.867954] ? loop_probe+0x160/0x160 [ 1591.871771] blkdev_ioctl+0x96b/0x1860 [ 1591.875663] ? blkpg_ioctl+0x980/0x980 [ 1591.879554] ? __might_sleep+0x93/0xb0 [ 1591.883450] ? __fget+0x210/0x370 [ 1591.887044] block_ioctl+0xde/0x120 [ 1591.890672] ? blkdev_fallocate+0x3b0/0x3b0 [ 1591.894992] do_vfs_ioctl+0x7ae/0x1060 [ 1591.898876] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1591.903654] ? lock_downgrade+0x740/0x740 [ 1591.907807] ? ioctl_preallocate+0x1c0/0x1c0 [ 1591.912220] ? __fget+0x237/0x370 [ 1591.916808] ? security_file_ioctl+0x89/0xb0 [ 1591.921245] SyS_ioctl+0x8f/0xc0 [ 1591.924637] ? do_vfs_ioctl+0x1060/0x1060 [ 1591.928802] do_syscall_64+0x1e8/0x640 [ 1591.932787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1591.937667] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1591.943225] RIP: 0033:0x45a4e7 [ 1591.946417] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1591.954266] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1591.961557] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1591.969022] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1591.976297] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 01:38:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) [ 1591.984275] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1591.995869] hfsplus: session requires an argument [ 1592.004728] hfsplus: unable to parse mount options 01:38:08 executing program 3 (fault-call:4 fault-nth:12): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1592.139724] FAULT_INJECTION: forcing a failure. [ 1592.139724] name failslab, interval 1, probability 0, space 0, times 0 [ 1592.152232] CPU: 0 PID: 17000 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1592.160566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1592.169931] Call Trace: [ 1592.172529] dump_stack+0x142/0x197 [ 1592.176280] should_fail.cold+0x10f/0x159 [ 1592.180445] ? radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 1592.186276] should_failslab+0xdb/0x130 [ 1592.190250] kmem_cache_alloc+0x47/0x780 [ 1592.194328] ? save_stack_trace+0x16/0x20 [ 1592.198580] ? save_stack+0x45/0xd0 [ 1592.202213] ? kasan_kmalloc+0xce/0xf0 [ 1592.206711] ? kasan_slab_alloc+0xf/0x20 [ 1592.210774] ? kmem_cache_alloc+0x12e/0x780 [ 1592.215105] ? __kernfs_new_node+0x70/0x420 [ 1592.219422] ? kernfs_new_node+0x80/0xf0 [ 1592.224114] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 1592.229839] idr_get_free_cmn+0x563/0x8d0 [ 1592.234002] idr_alloc_cmn+0x10e/0x210 [ 1592.238245] ? __fprop_inc_percpu_max+0x1e0/0x1e0 [ 1592.243087] ? __lock_is_held+0xb6/0x140 [ 1592.247149] ? check_preemption_disabled+0x3c/0x250 [ 1592.252517] idr_alloc_cyclic+0xd0/0x1e2 [ 1592.257464] ? ida_simple_remove+0x60/0x60 [ 1592.262302] __kernfs_new_node+0xe4/0x420 [ 1592.266459] kernfs_new_node+0x80/0xf0 [ 1592.270349] kernfs_create_dir_ns+0x41/0x140 [ 1592.274763] internal_create_group+0xea/0x7b0 [ 1592.279249] sysfs_create_group+0x20/0x30 [ 1592.283402] lo_ioctl+0x1176/0x1ce0 [ 1592.287116] ? loop_probe+0x160/0x160 [ 1592.290917] blkdev_ioctl+0x96b/0x1860 [ 1592.294808] ? blkpg_ioctl+0x980/0x980 [ 1592.298692] ? __might_sleep+0x93/0xb0 [ 1592.302602] ? __fget+0x210/0x370 [ 1592.306144] block_ioctl+0xde/0x120 [ 1592.309762] ? blkdev_fallocate+0x3b0/0x3b0 [ 1592.314077] do_vfs_ioctl+0x7ae/0x1060 [ 1592.317956] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1592.322703] ? lock_downgrade+0x740/0x740 [ 1592.326867] ? ioctl_preallocate+0x1c0/0x1c0 [ 1592.331283] ? __fget+0x237/0x370 [ 1592.334742] ? security_file_ioctl+0x89/0xb0 [ 1592.341287] SyS_ioctl+0x8f/0xc0 [ 1592.344766] ? do_vfs_ioctl+0x1060/0x1060 [ 1592.349026] do_syscall_64+0x1e8/0x640 [ 1592.352917] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1592.358030] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1592.363329] RIP: 0033:0x45a4e7 [ 1592.366515] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1592.374215] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1592.381477] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1592.388758] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1592.396044] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1592.403307] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1592.417099] hfsplus: session requires an argument [ 1592.422654] hfsplus: unable to parse mount options 01:38:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c4", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:10 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:38:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) dup2(0xffffffffffffffff, r3) 01:38:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:38:10 executing program 3 (fault-call:4 fault-nth:13): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1594.269247] FAULT_INJECTION: forcing a failure. [ 1594.269247] name failslab, interval 1, probability 0, space 0, times 0 [ 1594.280603] CPU: 1 PID: 17011 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1594.288850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.298232] Call Trace: [ 1594.300913] dump_stack+0x142/0x197 [ 1594.304744] should_fail.cold+0x10f/0x159 [ 1594.308888] ? radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 1594.314697] should_failslab+0xdb/0x130 [ 1594.318833] kmem_cache_alloc+0x47/0x780 [ 1594.322893] ? save_stack_trace+0x16/0x20 [ 1594.327036] ? save_stack+0x45/0xd0 [ 1594.330649] ? kasan_kmalloc+0xce/0xf0 [ 1594.335490] ? kasan_slab_alloc+0xf/0x20 [ 1594.339544] ? kmem_cache_alloc+0x12e/0x780 [ 1594.343850] ? __kernfs_new_node+0x70/0x420 [ 1594.348156] ? kernfs_new_node+0x80/0xf0 [ 1594.352204] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 1594.357812] idr_get_free_cmn+0x563/0x8d0 [ 1594.362206] idr_alloc_cmn+0x10e/0x210 [ 1594.366235] ? __fprop_inc_percpu_max+0x1e0/0x1e0 [ 1594.371073] ? __lock_is_held+0xb6/0x140 [ 1594.375167] ? check_preemption_disabled+0x3c/0x250 [ 1594.380181] idr_alloc_cyclic+0xd0/0x1e2 [ 1594.384458] ? ida_simple_remove+0x60/0x60 [ 1594.388678] __kernfs_new_node+0xe4/0x420 [ 1594.392854] kernfs_new_node+0x80/0xf0 [ 1594.398068] kernfs_create_dir_ns+0x41/0x140 [ 1594.402560] internal_create_group+0xea/0x7b0 [ 1594.407200] sysfs_create_group+0x20/0x30 [ 1594.411624] lo_ioctl+0x1176/0x1ce0 [ 1594.415247] ? loop_probe+0x160/0x160 [ 1594.419035] blkdev_ioctl+0x96b/0x1860 [ 1594.423448] ? blkpg_ioctl+0x980/0x980 [ 1594.428400] ? __might_sleep+0x93/0xb0 [ 1594.432281] ? __fget+0x210/0x370 [ 1594.435717] block_ioctl+0xde/0x120 [ 1594.439586] ? blkdev_fallocate+0x3b0/0x3b0 [ 1594.444151] do_vfs_ioctl+0x7ae/0x1060 [ 1594.448107] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1594.453034] ? lock_downgrade+0x740/0x740 [ 1594.457688] ? ioctl_preallocate+0x1c0/0x1c0 [ 1594.462079] ? __fget+0x237/0x370 [ 1594.466736] ? security_file_ioctl+0x89/0xb0 [ 1594.475484] SyS_ioctl+0x8f/0xc0 [ 1594.478831] ? do_vfs_ioctl+0x1060/0x1060 [ 1594.483065] do_syscall_64+0x1e8/0x640 [ 1594.487543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1594.492375] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1594.498071] RIP: 0033:0x45a4e7 [ 1594.501527] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1594.509595] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1594.517930] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1594.527528] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1594.535985] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1594.543244] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1594.566197] hfsplus: session requires an argument 01:38:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={r5, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x0, 0x8001, 0x0, 0x80000000, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000040)={r5, 0x0, 0xd5d0, 0x1ff, 0x81, 0xff}, &(0x7f0000000080)=0x14) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3fa", 0x10b}], 0x4, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r8, &(0x7f00000005c0)="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"}, 0x20) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000180)=0xa5, 0x8) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) [ 1594.617670] hfsplus: unable to parse mount options [ 1594.629725] input: syz1 as /devices/virtual/input/input29 01:38:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) dup2(0xffffffffffffffff, r3) 01:38:11 executing program 3 (fault-call:4 fault-nth:14): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) [ 1594.784342] FAULT_INJECTION: forcing a failure. [ 1594.784342] name failslab, interval 1, probability 0, space 0, times 0 [ 1594.806447] CPU: 1 PID: 17041 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1594.814904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.824668] Call Trace: [ 1594.824689] dump_stack+0x142/0x197 [ 1594.824710] should_fail.cold+0x10f/0x159 [ 1594.830913] should_failslab+0xdb/0x130 [ 1594.830925] kmem_cache_alloc+0x2d7/0x780 [ 1594.830939] ? __mutex_unlock_slowpath+0x71/0x800 [ 1594.830950] ? __lock_is_held+0xb6/0x140 [ 1594.830965] __kernfs_new_node+0x70/0x420 [ 1594.839069] kernfs_new_node+0x80/0xf0 [ 1594.839082] __kernfs_create_file+0x46/0x323 [ 1594.839096] sysfs_add_file_mode_ns+0x1e4/0x450 [ 1594.848066] internal_create_group+0x232/0x7b0 [ 1594.848083] sysfs_create_group+0x20/0x30 [ 1594.848096] lo_ioctl+0x1176/0x1ce0 [ 1594.852508] input: syz1 as /devices/virtual/input/input30 [ 1594.856304] ? loop_probe+0x160/0x160 [ 1594.856317] blkdev_ioctl+0x96b/0x1860 [ 1594.856329] ? blkpg_ioctl+0x980/0x980 [ 1594.864601] ? __might_sleep+0x93/0xb0 [ 1594.864611] ? __fget+0x210/0x370 [ 1594.864625] block_ioctl+0xde/0x120 [ 1594.881798] ? blkdev_fallocate+0x3b0/0x3b0 [ 1594.881809] do_vfs_ioctl+0x7ae/0x1060 [ 1594.881822] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1594.881835] ? lock_downgrade+0x740/0x740 [ 1594.881845] ? ioctl_preallocate+0x1c0/0x1c0 01:38:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x1}, 0x28, 0x2) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) lchown(&(0x7f0000000000)='./file0\x00', 0xee00, r4) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1594.881856] ? __fget+0x237/0x370 [ 1594.881871] ? security_file_ioctl+0x89/0xb0 [ 1594.881883] SyS_ioctl+0x8f/0xc0 [ 1594.891216] ? do_vfs_ioctl+0x1060/0x1060 [ 1594.891230] do_syscall_64+0x1e8/0x640 [ 1594.891241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1594.891257] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1594.891266] RIP: 0033:0x45a4e7 [ 1594.891271] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1594.891281] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 01:38:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1594.891286] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1594.891294] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1594.910000] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1594.910006] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1594.994562] hfsplus: session requires an argument [ 1595.019073] hfsplus: unable to parse mount options 01:38:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c4", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:14 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:38:14 executing program 3 (fault-call:4 fault-nth:15): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) dup2(0xffffffffffffffff, r3) 01:38:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1597.623659] input: syz1 as /devices/virtual/input/input31 [ 1597.644537] FAULT_INJECTION: forcing a failure. [ 1597.644537] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.699142] CPU: 1 PID: 17072 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1597.707199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1597.716809] Call Trace: [ 1597.719420] dump_stack+0x142/0x197 [ 1597.723086] should_fail.cold+0x10f/0x159 [ 1597.727309] should_failslab+0xdb/0x130 [ 1597.731324] kmem_cache_alloc+0x2d7/0x780 [ 1597.735486] ? wait_for_completion+0x420/0x420 [ 1597.740086] __kernfs_new_node+0x70/0x420 [ 1597.744677] kernfs_new_node+0x80/0xf0 01:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, 0xffffffffffffffff) [ 1597.748648] __kernfs_create_file+0x46/0x323 [ 1597.753080] sysfs_add_file_mode_ns+0x1e4/0x450 [ 1597.757763] internal_create_group+0x232/0x7b0 [ 1597.762356] sysfs_create_group+0x20/0x30 [ 1597.766537] lo_ioctl+0x1176/0x1ce0 [ 1597.770285] ? loop_probe+0x160/0x160 [ 1597.774137] blkdev_ioctl+0x96b/0x1860 [ 1597.778032] ? blkpg_ioctl+0x980/0x980 [ 1597.781937] ? __might_sleep+0x93/0xb0 [ 1597.785834] ? __fget+0x210/0x370 [ 1597.789353] block_ioctl+0xde/0x120 [ 1597.793010] ? blkdev_fallocate+0x3b0/0x3b0 [ 1597.797350] do_vfs_ioctl+0x7ae/0x1060 [ 1597.801273] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1597.806029] ? lock_downgrade+0x740/0x740 [ 1597.806044] ? ioctl_preallocate+0x1c0/0x1c0 [ 1597.806057] ? __fget+0x237/0x370 [ 1597.806075] ? security_file_ioctl+0x89/0xb0 [ 1597.806088] SyS_ioctl+0x8f/0xc0 [ 1597.806097] ? do_vfs_ioctl+0x1060/0x1060 [ 1597.806110] do_syscall_64+0x1e8/0x640 [ 1597.814648] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1597.814669] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1597.814677] RIP: 0033:0x45a4e7 01:38:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1597.814683] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1597.814695] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1597.814700] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1597.814705] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1597.814712] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1597.830077] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1597.868862] input: syz1 as /devices/virtual/input/input32 01:38:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000000)="ab") ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, 0xffffffffffffffff) [ 1597.931975] hfsplus: session requires an argument [ 1597.949699] hfsplus: unable to parse mount options 01:38:14 executing program 3 (fault-call:4 fault-nth:16): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r2, 0x5501) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, 0xffffffffffffffff) [ 1598.046850] input: syz1 as /devices/virtual/input/input33 [ 1598.118789] FAULT_INJECTION: forcing a failure. [ 1598.118789] name failslab, interval 1, probability 0, space 0, times 0 [ 1598.138757] CPU: 1 PID: 17112 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1598.146677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1598.156026] Call Trace: [ 1598.156049] dump_stack+0x142/0x197 [ 1598.156069] should_fail.cold+0x10f/0x159 [ 1598.162388] should_failslab+0xdb/0x130 [ 1598.162400] kmem_cache_alloc+0x2d7/0x780 [ 1598.162411] ? wait_for_completion+0x420/0x420 [ 1598.162429] __kernfs_new_node+0x70/0x420 [ 1598.162442] kernfs_new_node+0x80/0xf0 [ 1598.162452] __kernfs_create_file+0x46/0x323 [ 1598.162467] sysfs_add_file_mode_ns+0x1e4/0x450 [ 1598.170594] internal_create_group+0x232/0x7b0 [ 1598.170613] sysfs_create_group+0x20/0x30 [ 1598.170625] lo_ioctl+0x1176/0x1ce0 [ 1598.170642] ? loop_probe+0x160/0x160 [ 1598.170656] blkdev_ioctl+0x96b/0x1860 [ 1598.170664] ? blkpg_ioctl+0x980/0x980 [ 1598.170678] ? __might_sleep+0x93/0xb0 [ 1598.170688] ? __fget+0x210/0x370 [ 1598.170700] block_ioctl+0xde/0x120 [ 1598.170711] ? blkdev_fallocate+0x3b0/0x3b0 [ 1598.170725] do_vfs_ioctl+0x7ae/0x1060 [ 1598.179679] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1598.179691] ? lock_downgrade+0x740/0x740 [ 1598.179704] ? ioctl_preallocate+0x1c0/0x1c0 [ 1598.179717] ? __fget+0x237/0x370 [ 1598.179734] ? security_file_ioctl+0x89/0xb0 [ 1598.184547] input: syz1 as /devices/virtual/input/input34 [ 1598.187774] SyS_ioctl+0x8f/0xc0 [ 1598.187787] ? do_vfs_ioctl+0x1060/0x1060 [ 1598.187808] do_syscall_64+0x1e8/0x640 [ 1598.187815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1598.187831] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1598.197023] RIP: 0033:0x45a4e7 [ 1598.197029] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1598.197040] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1598.197046] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1598.197052] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1598.197057] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1598.197063] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1598.255688] hfsplus: session requires an argument [ 1598.290406] hfsplus: unable to parse mount options 01:38:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c4", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:17 executing program 3 (fault-call:4 fault-nth:17): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:17 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1600.738190] FAULT_INJECTION: forcing a failure. [ 1600.738190] name failslab, interval 1, probability 0, space 0, times 0 [ 1600.766346] CPU: 0 PID: 17131 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1600.774522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1600.774529] Call Trace: [ 1600.774554] dump_stack+0x142/0x197 [ 1600.774575] should_fail.cold+0x10f/0x159 [ 1600.794866] should_failslab+0xdb/0x130 [ 1600.798896] kmem_cache_alloc+0x2d7/0x780 [ 1600.803165] ? wait_for_completion+0x420/0x420 [ 1600.807789] __kernfs_new_node+0x70/0x420 [ 1600.811972] kernfs_new_node+0x80/0xf0 [ 1600.816051] __kernfs_create_file+0x46/0x323 [ 1600.820491] sysfs_add_file_mode_ns+0x1e4/0x450 [ 1600.825186] internal_create_group+0x232/0x7b0 [ 1600.829802] sysfs_create_group+0x20/0x30 [ 1600.833977] lo_ioctl+0x1176/0x1ce0 01:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1600.837635] ? loop_probe+0x160/0x160 [ 1600.841541] blkdev_ioctl+0x96b/0x1860 [ 1600.845454] ? blkpg_ioctl+0x980/0x980 [ 1600.849371] ? __might_sleep+0x93/0xb0 [ 1600.853281] ? __fget+0x210/0x370 [ 1600.857140] block_ioctl+0xde/0x120 [ 1600.861315] ? blkdev_fallocate+0x3b0/0x3b0 [ 1600.865696] do_vfs_ioctl+0x7ae/0x1060 [ 1600.869597] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1600.869611] ? lock_downgrade+0x740/0x740 [ 1600.869628] ? ioctl_preallocate+0x1c0/0x1c0 [ 1600.878649] ? __fget+0x237/0x370 01:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1600.878669] ? security_file_ioctl+0x89/0xb0 [ 1600.878685] SyS_ioctl+0x8f/0xc0 [ 1600.878695] ? do_vfs_ioctl+0x1060/0x1060 [ 1600.878710] do_syscall_64+0x1e8/0x640 [ 1600.886824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1600.886845] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1600.886854] RIP: 0033:0x45a4e7 [ 1600.886862] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 [ 1600.913606] ORIG_RAX: 0000000000000010 [ 1600.922163] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 01:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1600.922170] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1600.922174] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1600.922178] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1600.922183] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1600.969292] hfsplus: session requires an argument [ 1600.975409] hfsplus: unable to parse mount options 01:38:17 executing program 3 (fault-call:4 fault-nth:18): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3fa", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r8, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r8, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000000)) getsockopt$inet6_mreq(r7, 0x29, 0x0, &(0x7f0000001640)={@local, 0x0}, &(0x7f0000001680)=0x14) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000016c0)={'batadv0\x00', r9}) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:17 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1601.185841] FAULT_INJECTION: forcing a failure. [ 1601.185841] name failslab, interval 1, probability 0, space 0, times 0 [ 1601.205842] CPU: 1 PID: 17164 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1601.213926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1601.223448] Call Trace: [ 1601.226099] dump_stack+0x142/0x197 [ 1601.229784] should_fail.cold+0x10f/0x159 [ 1601.233965] should_failslab+0xdb/0x130 [ 1601.237967] kmem_cache_alloc+0x2d7/0x780 [ 1601.242147] ? wait_for_completion+0x420/0x420 [ 1601.246752] __kernfs_new_node+0x70/0x420 [ 1601.250918] kernfs_new_node+0x80/0xf0 [ 1601.254831] __kernfs_create_file+0x46/0x323 [ 1601.259260] sysfs_add_file_mode_ns+0x1e4/0x450 [ 1601.259274] internal_create_group+0x232/0x7b0 [ 1601.268731] sysfs_create_group+0x20/0x30 [ 1601.268759] lo_ioctl+0x1176/0x1ce0 [ 1601.268783] ? loop_probe+0x160/0x160 [ 1601.268818] blkdev_ioctl+0x96b/0x1860 [ 1601.284362] ? blkpg_ioctl+0x980/0x980 [ 1601.288248] ? __might_sleep+0x93/0xb0 [ 1601.292368] ? __fget+0x210/0x370 [ 1601.296271] block_ioctl+0xde/0x120 [ 1601.300010] ? blkdev_fallocate+0x3b0/0x3b0 [ 1601.304337] do_vfs_ioctl+0x7ae/0x1060 [ 1601.308387] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1601.313147] ? lock_downgrade+0x740/0x740 [ 1601.317900] ? ioctl_preallocate+0x1c0/0x1c0 [ 1601.322319] ? __fget+0x237/0x370 [ 1601.325767] ? security_file_ioctl+0x89/0xb0 [ 1601.330470] SyS_ioctl+0x8f/0xc0 [ 1601.333991] ? do_vfs_ioctl+0x1060/0x1060 [ 1601.341941] do_syscall_64+0x1e8/0x640 [ 1601.345837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1601.350834] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1601.356205] RIP: 0033:0x45a4e7 [ 1601.359631] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1601.367481] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1601.374770] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1601.382050] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1601.389544] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1601.397430] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1601.429661] hfsplus: session requires an argument [ 1601.454846] hfsplus: unable to parse mount options 01:38:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e626", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) 01:38:20 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:20 executing program 3 (fault-call:4 fault-nth:19): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:20 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x80000001, 0x0) 01:38:20 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1603.821381] FAULT_INJECTION: forcing a failure. [ 1603.821381] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.835430] CPU: 1 PID: 17197 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1603.843382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.852887] Call Trace: [ 1603.855504] dump_stack+0x142/0x197 [ 1603.859159] should_fail.cold+0x10f/0x159 [ 1603.863333] should_failslab+0xdb/0x130 [ 1603.867358] kmem_cache_alloc+0x2d7/0x780 01:38:20 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1603.871565] ? wait_for_completion+0x420/0x420 [ 1603.876175] __kernfs_new_node+0x70/0x420 [ 1603.880377] kernfs_new_node+0x80/0xf0 [ 1603.884294] __kernfs_create_file+0x46/0x323 [ 1603.888759] sysfs_add_file_mode_ns+0x1e4/0x450 [ 1603.893474] internal_create_group+0x232/0x7b0 [ 1603.898080] sysfs_create_group+0x20/0x30 [ 1603.902342] lo_ioctl+0x1176/0x1ce0 [ 1603.905997] ? loop_probe+0x160/0x160 [ 1603.909824] blkdev_ioctl+0x96b/0x1860 [ 1603.913740] ? blkpg_ioctl+0x980/0x980 [ 1603.917661] ? __might_sleep+0x93/0xb0 01:38:20 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) [ 1603.921563] ? __fget+0x210/0x370 [ 1603.925038] block_ioctl+0xde/0x120 [ 1603.928692] ? blkdev_fallocate+0x3b0/0x3b0 [ 1603.933049] do_vfs_ioctl+0x7ae/0x1060 [ 1603.937053] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1603.941854] ? lock_downgrade+0x740/0x740 [ 1603.946145] ? ioctl_preallocate+0x1c0/0x1c0 [ 1603.950589] ? __fget+0x237/0x370 [ 1603.954438] ? security_file_ioctl+0x89/0xb0 [ 1603.959010] SyS_ioctl+0x8f/0xc0 [ 1603.962423] ? do_vfs_ioctl+0x1060/0x1060 [ 1603.966742] do_syscall_64+0x1e8/0x640 [ 1603.966754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1603.966772] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1603.966781] RIP: 0033:0x45a4e7 [ 1603.966786] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1603.966795] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1603.966799] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1603.966804] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:38:20 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1603.966810] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1603.966815] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:20 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:38:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r4, r3) [ 1604.112636] hfsplus: session requires an argument [ 1604.126181] hfsplus: unable to parse mount options 01:38:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e626", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:23 executing program 3 (fault-call:4 fault-nth:20): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:23 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:38:23 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:38:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:23 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x0, 0x0) [ 1606.924998] FAULT_INJECTION: forcing a failure. [ 1606.924998] name failslab, interval 1, probability 0, space 0, times 0 [ 1607.000180] CPU: 0 PID: 17252 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1607.008111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1607.017472] Call Trace: [ 1607.020084] dump_stack+0x142/0x197 [ 1607.023733] should_fail.cold+0x10f/0x159 [ 1607.027911] should_failslab+0xdb/0x130 [ 1607.031891] kmem_cache_alloc+0x2d7/0x780 [ 1607.031904] ? wait_for_completion+0x420/0x420 [ 1607.031922] __kernfs_new_node+0x70/0x420 [ 1607.040628] kernfs_new_node+0x80/0xf0 [ 1607.040639] __kernfs_create_file+0x46/0x323 [ 1607.040650] sysfs_add_file_mode_ns+0x1e4/0x450 [ 1607.040663] internal_create_group+0x232/0x7b0 [ 1607.040681] sysfs_create_group+0x20/0x30 [ 1607.066583] lo_ioctl+0x1176/0x1ce0 [ 1607.070231] ? loop_probe+0x160/0x160 [ 1607.074086] blkdev_ioctl+0x96b/0x1860 [ 1607.077983] ? blkpg_ioctl+0x980/0x980 [ 1607.081891] ? __might_sleep+0x93/0xb0 [ 1607.085796] ? __fget+0x210/0x370 [ 1607.089355] block_ioctl+0xde/0x120 [ 1607.092997] ? blkdev_fallocate+0x3b0/0x3b0 [ 1607.097326] do_vfs_ioctl+0x7ae/0x1060 [ 1607.101319] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1607.106079] ? lock_downgrade+0x740/0x740 [ 1607.110221] ? ioctl_preallocate+0x1c0/0x1c0 [ 1607.110232] ? __fget+0x237/0x370 [ 1607.110248] ? security_file_ioctl+0x89/0xb0 [ 1607.110263] SyS_ioctl+0x8f/0xc0 [ 1607.110271] ? do_vfs_ioctl+0x1060/0x1060 [ 1607.110286] do_syscall_64+0x1e8/0x640 [ 1607.133927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1607.138787] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1607.143984] RIP: 0033:0x45a4e7 01:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) socket$inet6(0xa, 0x80003, 0xff) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:38:23 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3fa", 0x10b}], 0x4, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x93, 0x40) sendmmsg$nfc_llcp(r4, &(0x7f0000000180)=[{&(0x7f0000000100)={0x27, 0x1, 0x1, 0x3, 0x7f, 0x20, "b41972c78befb06105bca16e8c0aeda940098d2beb9a9971b18f345267473e647a1b9584651fcb8be42a87501f56c1e3007968b11a1774810f51aa7ce606ce", 0x18}, 0x60, &(0x7f0000000080)=[{&(0x7f0000000480)="2b95829703f257324be6fb08ad4111f3ebe6e2faa1b88c0c4fcabe63a166ddd73a485f2972782518add98d148e6a62ad344305fc48ab3795b2c229be5289c13eb86c8f8f19a47e3a31aeebbdd97e0adbd1f97f52ea676a44b9d326ad53104ba63eb1e1f8d33d51", 0x67}, {&(0x7f0000000500)="3ff502a7a3597b66d937a39f634269c241c26710e327952d7111352721d33454a2fb732b0a28bcdadd94e34f5ae6a2856d1e66451a91045a446b8640c686189551105fe189471affbacd03f2d074d8d43585954e462d46b4a301cff743d837217871adb15b980e7d93beed42f0acf9cd588932c917932756fe5204c775d6557f43d89da6d7daf1a2cecb9e84d48ad671d913", 0x92}, {&(0x7f00000005c0)="91b96c7c9efc86a957e93aad2f30bb8d324771f88a76c3f7359cdb428c9432750f9bfacc3ec3d890062b0a0a5b2a678704384663279365da4519bb0bc4951c966f31808c9b06e5e9b0e62ce651f4cecaba53b71795294f488cec9f5bc5b52f75bbcb5ac86fdf9ad32524f0908d2f3ae48896c1ed9ee45461e1cfec", 0x7b}], 0x3, &(0x7f0000000640)={0xf0, 0x2f, 0x3, "ca14cb9fe221351f27bd7a7c47492bb81eea9532cb355214f184ac69f8f60e9642e9117943446fdceb7b22bc366e9ddf6ebbe85d31fbeb47b5aad2a86bc2cb2ce777aa62763f7446ba76c2bd240b4075cf055e0e2752d4f94b5b9874cfe858fe7f813135f6dbd1a21e047ade16c45b54cca94ae8ab7f06f05ef7789877fa761786f1ae25d6dd30b86e4d35479a9cb2ebd12a1a3d351a399404eee3d0354cf31cc985dc56da5f4659595df625f696ef86b1b7a75afa2964a1fc16f45d8e3d1b1540987c7500b961b3a2e236b9d6040cd28f36f550d54f1b8781819372e8"}, 0xf0, 0x28000827}], 0x1, 0x1) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1607.147181] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1607.154897] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1607.162175] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1607.169463] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1607.176742] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1607.184020] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1607.256379] input: syz1 as /devices/virtual/input/input41 [ 1607.272241] hfsplus: session requires an argument [ 1607.313489] hfsplus: unable to parse mount options 01:38:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e626", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:26 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x0, 0x0) 01:38:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) process_vm_writev(r4, &(0x7f0000000600)=[{&(0x7f0000000080)}, {&(0x7f0000000100)=""/150, 0x96}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/229, 0xe5}, {&(0x7f0000000500)=""/150, 0x96}, {&(0x7f00000005c0)=""/31, 0x1f}], 0x6, &(0x7f0000001980)=[{&(0x7f0000000680)=""/5, 0x5}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/91, 0x5b}, {&(0x7f0000001740)=""/9, 0x9}, {&(0x7f0000001780)=""/7, 0x7}, {&(0x7f00000017c0)=""/178, 0xb2}, {&(0x7f0000001880)=""/224, 0xe0}], 0x7, 0x0) chroot(&(0x7f0000000000)='./file0\x00') wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000040)={0xad}) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:26 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:38:26 executing program 3 (fault-call:4 fault-nth:21): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:26 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x0, 0x0) [ 1610.008612] FAULT_INJECTION: forcing a failure. [ 1610.008612] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.027476] CPU: 1 PID: 17321 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1610.035417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1610.044782] Call Trace: [ 1610.047382] dump_stack+0x142/0x197 [ 1610.051028] should_fail.cold+0x10f/0x159 [ 1610.055210] should_failslab+0xdb/0x130 [ 1610.059205] __kmalloc+0x2f0/0x7a0 [ 1610.062854] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1610.068321] ? kobject_uevent_env+0x378/0xc23 [ 1610.072837] ? rcu_read_lock_sched_held+0x110/0x130 [ 1610.083775] ? kobject_get_path+0xbb/0x1a0 [ 1610.088030] kobject_get_path+0xbb/0x1a0 [ 1610.092112] ? devm_device_remove_groups+0x50/0x50 [ 1610.097054] kobject_uevent_env+0x39c/0xc23 [ 1610.101391] ? internal_create_group+0x49a/0x7b0 01:38:26 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1610.106174] kobject_uevent+0x20/0x26 [ 1610.109985] lo_ioctl+0x11e7/0x1ce0 [ 1610.113623] ? loop_probe+0x160/0x160 [ 1610.117431] blkdev_ioctl+0x96b/0x1860 [ 1610.121324] ? blkpg_ioctl+0x980/0x980 [ 1610.125220] ? __might_sleep+0x93/0xb0 [ 1610.125230] ? __fget+0x210/0x370 [ 1610.125244] block_ioctl+0xde/0x120 [ 1610.132571] ? blkdev_fallocate+0x3b0/0x3b0 [ 1610.132582] do_vfs_ioctl+0x7ae/0x1060 [ 1610.132592] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1610.132604] ? lock_downgrade+0x740/0x740 [ 1610.132615] ? ioctl_preallocate+0x1c0/0x1c0 [ 1610.132628] ? __fget+0x237/0x370 [ 1610.132643] ? security_file_ioctl+0x89/0xb0 [ 1610.132654] SyS_ioctl+0x8f/0xc0 [ 1610.132662] ? do_vfs_ioctl+0x1060/0x1060 [ 1610.132673] do_syscall_64+0x1e8/0x640 [ 1610.132682] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1610.132699] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1610.132706] RIP: 0033:0x45a4e7 [ 1610.132710] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1610.132720] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 01:38:26 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:26 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) gettid() r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@gettclass={0x28, 0x2a, 0x2, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0x7, 0x17}, {0xffe1, 0xd}, {0x5, 0x2}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8e7, 0x7ff}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = getpid() tkill(r6, 0x9) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x9}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r7 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f0000077000)=""/133, 0x2800) 01:38:26 executing program 3 (fault-call:4 fault-nth:22): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1610.132725] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1610.132730] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1610.132734] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1610.132739] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1610.147257] hfsplus: session requires an argument [ 1610.221168] hfsplus: unable to parse mount options [ 1610.251934] input: syz1 as /devices/virtual/input/input42 01:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) [ 1610.355904] overlayfs: unrecognized mount option "À" or missing value [ 1610.377988] FAULT_INJECTION: forcing a failure. [ 1610.377988] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.384596] overlayfs: fs on '.' does not support file handles, falling back to index=off. [ 1610.409799] overlayfs: failed to resolve 'file0': -2 [ 1610.419833] CPU: 0 PID: 17359 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1610.427855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1610.437234] Call Trace: [ 1610.439841] dump_stack+0x142/0x197 [ 1610.443506] should_fail.cold+0x10f/0x159 [ 1610.447763] should_failslab+0xdb/0x130 [ 1610.451767] kmem_cache_alloc_node_trace+0x280/0x770 [ 1610.456904] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1610.456920] __kmalloc_node_track_caller+0x3d/0x80 [ 1610.456936] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1610.456948] __alloc_skb+0xcf/0x500 [ 1610.467331] ? skb_trim+0x180/0x180 [ 1610.467346] ? netlink_has_listeners+0x20a/0x330 [ 1610.467359] kobject_uevent_env+0x781/0xc23 [ 1610.467371] ? internal_create_group+0x49a/0x7b0 [ 1610.493196] kobject_uevent+0x20/0x26 [ 1610.496987] lo_ioctl+0x11e7/0x1ce0 [ 1610.500614] ? loop_probe+0x160/0x160 [ 1610.504416] blkdev_ioctl+0x96b/0x1860 [ 1610.508300] ? blkpg_ioctl+0x980/0x980 [ 1610.512183] ? __might_sleep+0x93/0xb0 [ 1610.516061] ? __fget+0x210/0x370 [ 1610.519507] block_ioctl+0xde/0x120 [ 1610.523129] ? blkdev_fallocate+0x3b0/0x3b0 [ 1610.527448] do_vfs_ioctl+0x7ae/0x1060 [ 1610.531327] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1610.536085] ? lock_downgrade+0x740/0x740 [ 1610.540220] ? ioctl_preallocate+0x1c0/0x1c0 [ 1610.544627] ? __fget+0x237/0x370 [ 1610.548070] ? security_file_ioctl+0x89/0xb0 [ 1610.552559] SyS_ioctl+0x8f/0xc0 [ 1610.555911] ? do_vfs_ioctl+0x1060/0x1060 [ 1610.560051] do_syscall_64+0x1e8/0x640 [ 1610.563948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1610.568794] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1610.573966] RIP: 0033:0x45a4e7 [ 1610.577141] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1610.584847] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1610.592101] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1610.599376] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1610.606654] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1610.613911] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1610.628669] input: syz1 as /devices/virtual/input/input43 [ 1610.629078] hfsplus: session requires an argument [ 1610.639955] hfsplus: unable to parse mount options 01:38:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:29 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) gettid() r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@gettclass={0x28, 0x2a, 0x2, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0x7, 0x17}, {0xffe1, 0xd}, {0x5, 0x2}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8e7, 0x7ff}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = getpid() tkill(r6, 0x9) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x9}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r7 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f0000077000)=""/133, 0x2800) 01:38:29 executing program 3 (fault-call:4 fault-nth:23): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) [ 1613.123915] input: syz1 as /devices/virtual/input/input44 [ 1613.137402] FAULT_INJECTION: forcing a failure. [ 1613.137402] name failslab, interval 1, probability 0, space 0, times 0 [ 1613.183508] CPU: 0 PID: 17392 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1613.191467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.200839] Call Trace: [ 1613.204333] dump_stack+0x142/0x197 [ 1613.207995] should_fail.cold+0x10f/0x159 [ 1613.212172] should_failslab+0xdb/0x130 [ 1613.216171] kmem_cache_alloc_node_trace+0x280/0x770 [ 1613.221301] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1613.226768] __kmalloc_node_track_caller+0x3d/0x80 [ 1613.231710] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1613.236390] __alloc_skb+0xcf/0x500 [ 1613.240029] ? skb_trim+0x180/0x180 [ 1613.243674] ? netlink_has_listeners+0x20a/0x330 [ 1613.248448] kobject_uevent_env+0x781/0xc23 [ 1613.252792] kobject_uevent+0x20/0x26 [ 1613.256687] lo_ioctl+0x11e7/0x1ce0 [ 1613.260322] ? loop_probe+0x160/0x160 [ 1613.264257] blkdev_ioctl+0x96b/0x1860 [ 1613.268152] ? blkpg_ioctl+0x980/0x980 [ 1613.272062] ? __might_sleep+0x93/0xb0 [ 1613.275954] ? __fget+0x210/0x370 [ 1613.279413] block_ioctl+0xde/0x120 [ 1613.283060] ? blkdev_fallocate+0x3b0/0x3b0 [ 1613.287471] do_vfs_ioctl+0x7ae/0x1060 [ 1613.291365] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1613.296127] ? lock_downgrade+0x740/0x740 [ 1613.300288] ? ioctl_preallocate+0x1c0/0x1c0 [ 1613.304709] ? __fget+0x237/0x370 [ 1613.308177] ? security_file_ioctl+0x89/0xb0 [ 1613.312599] SyS_ioctl+0x8f/0xc0 [ 1613.315985] ? do_vfs_ioctl+0x1060/0x1060 [ 1613.320141] do_syscall_64+0x1e8/0x640 [ 1613.324037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1613.328894] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1613.334091] RIP: 0033:0x45a4e7 [ 1613.337281] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1613.345117] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1613.352396] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1613.359764] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1613.367045] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1613.374362] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1613.415484] hfsplus: session requires an argument [ 1613.425115] hfsplus: unable to parse mount options 01:38:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) gettid() r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@gettclass={0x28, 0x2a, 0x2, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0x7, 0x17}, {0xffe1, 0xd}, {0x5, 0x2}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8e7, 0x7ff}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = getpid() tkill(r6, 0x9) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x9}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r7 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f0000077000)=""/133, 0x2800) 01:38:30 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:30 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:30 executing program 3 (fault-call:4 fault-nth:24): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:30 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1613.638241] input: syz1 as /devices/virtual/input/input45 [ 1613.654766] FAULT_INJECTION: forcing a failure. [ 1613.654766] name failslab, interval 1, probability 0, space 0, times 0 [ 1613.688176] CPU: 1 PID: 17430 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1613.696124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.696132] Call Trace: [ 1613.696155] dump_stack+0x142/0x197 [ 1613.696174] should_fail.cold+0x10f/0x159 [ 1613.696194] should_failslab+0xdb/0x130 [ 1613.696207] kmem_cache_alloc_node_trace+0x280/0x770 [ 1613.696220] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1613.696234] __kmalloc_node_track_caller+0x3d/0x80 [ 1613.719927] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1613.719944] __alloc_skb+0xcf/0x500 [ 1613.740144] ? skb_trim+0x180/0x180 [ 1613.740157] ? netlink_has_listeners+0x20a/0x330 [ 1613.740174] kobject_uevent_env+0x781/0xc23 [ 1613.740190] kobject_uevent+0x20/0x26 [ 1613.740202] lo_ioctl+0x11e7/0x1ce0 [ 1613.740220] ? loop_probe+0x160/0x160 [ 1613.740235] blkdev_ioctl+0x96b/0x1860 [ 1613.752237] ? blkpg_ioctl+0x980/0x980 [ 1613.752299] ? __might_sleep+0x93/0xb0 [ 1613.752312] ? __fget+0x210/0x370 [ 1613.752326] block_ioctl+0xde/0x120 [ 1613.752335] ? blkdev_fallocate+0x3b0/0x3b0 [ 1613.752349] do_vfs_ioctl+0x7ae/0x1060 [ 1613.768148] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1613.768162] ? lock_downgrade+0x740/0x740 [ 1613.768175] ? ioctl_preallocate+0x1c0/0x1c0 [ 1613.786982] ? __fget+0x237/0x370 [ 1613.787002] ? security_file_ioctl+0x89/0xb0 [ 1613.816568] SyS_ioctl+0x8f/0xc0 [ 1613.819945] ? do_vfs_ioctl+0x1060/0x1060 [ 1613.824106] do_syscall_64+0x1e8/0x640 [ 1613.828000] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1613.832856] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1613.838058] RIP: 0033:0x45a4e7 [ 1613.841249] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1613.848972] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1613.856246] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1613.863518] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1613.870793] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1613.878071] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) gettid() r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@gettclass={0x28, 0x2a, 0x2, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0x7, 0x17}, {0xffe1, 0xd}, {0x5, 0x2}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8e7, 0x7ff}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = getpid() tkill(r6, 0x9) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x9}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r7 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f0000077000)=""/133, 0x2800) 01:38:30 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1614.139392] hfsplus: session requires an argument [ 1614.180737] hfsplus: unable to parse mount options [ 1614.377956] overlayfs: unrecognized mount option "À" or missing value 01:38:32 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:32 executing program 3 (fault-call:4 fault-nth:25): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:32 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) getpid() sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be85d7600", 0xffffff90, 0x60, 0x0, 0x127) 01:38:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x401, 0x4, 0x2, 0xfffff000}, &(0x7f0000000100)=0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x9, r3, 0x0, 0x83) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x24080, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000080)={r9, 0x3, 0x401}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f0000000000)={r9, 0x800, 0xffffff05}) [ 1616.178977] input: syz1 as /devices/virtual/input/input46 [ 1616.213756] FAULT_INJECTION: forcing a failure. [ 1616.213756] name failslab, interval 1, probability 0, space 0, times 0 01:38:32 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0x11, 0x1, 0x3}) [ 1616.258432] CPU: 0 PID: 17469 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1616.266369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1616.275733] Call Trace: [ 1616.278337] dump_stack+0x142/0x197 [ 1616.281987] should_fail.cold+0x10f/0x159 [ 1616.286163] should_failslab+0xdb/0x130 [ 1616.290151] kmem_cache_alloc_node_trace+0x280/0x770 [ 1616.295282] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1616.300747] __kmalloc_node_track_caller+0x3d/0x80 [ 1616.305689] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1616.310473] __alloc_skb+0xcf/0x500 [ 1616.314128] ? skb_trim+0x180/0x180 [ 1616.314142] ? netlink_has_listeners+0x20a/0x330 [ 1616.314157] kobject_uevent_env+0x781/0xc23 [ 1616.314173] kobject_uevent+0x20/0x26 [ 1616.322536] lo_ioctl+0x11e7/0x1ce0 [ 1616.322552] ? loop_probe+0x160/0x160 [ 1616.322571] blkdev_ioctl+0x96b/0x1860 [ 1616.322579] ? blkpg_ioctl+0x980/0x980 [ 1616.322595] ? __might_sleep+0x93/0xb0 [ 1616.322605] ? __fget+0x210/0x370 [ 1616.322619] block_ioctl+0xde/0x120 [ 1616.357195] ? blkdev_fallocate+0x3b0/0x3b0 [ 1616.361615] do_vfs_ioctl+0x7ae/0x1060 [ 1616.365509] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1616.370264] ? lock_downgrade+0x740/0x740 [ 1616.374418] ? ioctl_preallocate+0x1c0/0x1c0 [ 1616.378839] ? __fget+0x237/0x370 [ 1616.382299] ? security_file_ioctl+0x89/0xb0 [ 1616.386814] SyS_ioctl+0x8f/0xc0 [ 1616.390174] ? do_vfs_ioctl+0x1060/0x1060 [ 1616.394328] do_syscall_64+0x1e8/0x640 [ 1616.398221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1616.403069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 01:38:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x121000, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000040)={{0x90c0a8da2b78de0d, @local, 0x4e24, 0x3, 'nq\x00', 0x2, 0x5, 0x4f}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x4e24, 0x0, 0x6, 0x0, 0xff}}, 0x44) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1616.408246] RIP: 0033:0x45a4e7 [ 1616.411591] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1616.419289] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1616.426548] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1616.433806] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1616.441062] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1616.448328] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:33 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:33 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1616.522985] hfsplus: session requires an argument 01:38:33 executing program 5: io_setup(0x5, &(0x7f00000002c0)=0x0) io_submit(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x3, &(0x7f0000000c80)=[&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x6, 0x0, r1, 0x0}, 0x0, 0x0]) [ 1616.549134] hfsplus: unable to parse mount options 01:38:33 executing program 3 (fault-call:4 fault-nth:26): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1616.597379] input: syz1 as /devices/virtual/input/input47 [ 1616.657646] FAULT_INJECTION: forcing a failure. [ 1616.657646] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.672001] CPU: 1 PID: 17518 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1616.679910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1616.689288] Call Trace: [ 1616.689309] dump_stack+0x142/0x197 [ 1616.689324] should_fail.cold+0x10f/0x159 [ 1616.689338] should_failslab+0xdb/0x130 [ 1616.695532] kmem_cache_alloc_node+0x287/0x780 [ 1616.695553] __alloc_skb+0x9c/0x500 [ 1616.695563] ? skb_trim+0x180/0x180 [ 1616.715624] ? netlink_has_listeners+0x20a/0x330 [ 1616.720385] kobject_uevent_env+0x781/0xc23 [ 1616.724706] kobject_uevent+0x20/0x26 [ 1616.728493] lo_ioctl+0x11e7/0x1ce0 [ 1616.732119] ? loop_probe+0x160/0x160 [ 1616.735904] blkdev_ioctl+0x96b/0x1860 [ 1616.739808] ? blkpg_ioctl+0x980/0x980 [ 1616.743683] ? __might_sleep+0x93/0xb0 [ 1616.747558] ? __fget+0x210/0x370 [ 1616.751001] block_ioctl+0xde/0x120 [ 1616.754608] ? blkdev_fallocate+0x3b0/0x3b0 [ 1616.758911] do_vfs_ioctl+0x7ae/0x1060 [ 1616.762790] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1616.767555] ? lock_downgrade+0x740/0x740 [ 1616.771687] ? ioctl_preallocate+0x1c0/0x1c0 [ 1616.776081] ? __fget+0x237/0x370 [ 1616.779530] ? security_file_ioctl+0x89/0xb0 [ 1616.783944] SyS_ioctl+0x8f/0xc0 [ 1616.787315] ? do_vfs_ioctl+0x1060/0x1060 [ 1616.791456] do_syscall_64+0x1e8/0x640 [ 1616.795356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1616.800460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1616.805640] RIP: 0033:0x45a4e7 [ 1616.808809] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1616.816513] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1616.823774] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1616.831036] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1616.838358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1616.845629] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:33 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:33 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1616.855205] hfsplus: session requires an argument [ 1616.860572] hfsplus: unable to parse mount options 01:38:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:35 executing program 3 (fault-call:4 fault-nth:27): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000080)="8c88", 0x2}], 0x1}}, {{&(0x7f0000000200)={0x2, 0x0, @remote}, 0x10, 0x0}}], 0x2, 0x0) 01:38:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:35 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1619.318989] FAULT_INJECTION: forcing a failure. [ 1619.318989] name failslab, interval 1, probability 0, space 0, times 0 [ 1619.357008] CPU: 0 PID: 17552 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1619.364976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1619.374364] Call Trace: [ 1619.376982] dump_stack+0x142/0x197 [ 1619.380632] should_fail.cold+0x10f/0x159 [ 1619.384814] should_failslab+0xdb/0x130 [ 1619.388805] kmem_cache_alloc_node+0x287/0x780 [ 1619.393420] __alloc_skb+0x9c/0x500 [ 1619.397080] ? skb_trim+0x180/0x180 [ 1619.400828] ? netlink_has_listeners+0x20a/0x330 [ 1619.405624] kobject_uevent_env+0x781/0xc23 [ 1619.410101] kobject_uevent+0x20/0x26 [ 1619.413908] lo_ioctl+0x11e7/0x1ce0 [ 1619.417606] ? loop_probe+0x160/0x160 [ 1619.421404] blkdev_ioctl+0x96b/0x1860 [ 1619.425309] ? blkpg_ioctl+0x980/0x980 [ 1619.429191] ? __might_sleep+0x93/0xb0 [ 1619.433071] ? __fget+0x210/0x370 [ 1619.436538] block_ioctl+0xde/0x120 [ 1619.440206] ? blkdev_fallocate+0x3b0/0x3b0 [ 1619.444522] do_vfs_ioctl+0x7ae/0x1060 [ 1619.448531] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1619.453486] ? lock_downgrade+0x740/0x740 [ 1619.457813] ? ioctl_preallocate+0x1c0/0x1c0 [ 1619.462224] ? __fget+0x237/0x370 [ 1619.465690] ? security_file_ioctl+0x89/0xb0 [ 1619.470169] SyS_ioctl+0x8f/0xc0 [ 1619.473525] ? do_vfs_ioctl+0x1060/0x1060 [ 1619.477718] do_syscall_64+0x1e8/0x640 [ 1619.481611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1619.486523] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1619.491705] RIP: 0033:0x45a4e7 [ 1619.494882] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1619.502606] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1619.509979] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 01:38:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$VT_RELDISP(r2, 0x5605) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000140)={0x60, {0x2, 0x4ef3fdd0, 0xe200000, 0x1, 0x6, 0x1}}) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) accept$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:36 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') io_setup(0x7, &(0x7f0000000240)=0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 01:38:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1619.517241] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1619.524501] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1619.531866] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:36 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1619.594176] hfsplus: session requires an argument [ 1619.617996] hfsplus: unable to parse mount options 01:38:36 executing program 3 (fault-call:4 fault-nth:28): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4200, r3, 0x4, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1619.864257] FAULT_INJECTION: forcing a failure. [ 1619.864257] name failslab, interval 1, probability 0, space 0, times 0 [ 1619.902243] CPU: 0 PID: 17611 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1619.910170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1619.919534] Call Trace: [ 1619.922142] dump_stack+0x142/0x197 [ 1619.925794] should_fail.cold+0x10f/0x159 [ 1619.929955] should_failslab+0xdb/0x130 [ 1619.933929] kmem_cache_alloc_node+0x287/0x780 [ 1619.938515] __alloc_skb+0x9c/0x500 [ 1619.942138] ? skb_trim+0x180/0x180 [ 1619.945764] ? netlink_has_listeners+0x20a/0x330 [ 1619.950524] kobject_uevent_env+0x781/0xc23 [ 1619.954845] kobject_uevent+0x20/0x26 [ 1619.958644] lo_ioctl+0x11e7/0x1ce0 [ 1619.962272] ? loop_probe+0x160/0x160 [ 1619.966147] blkdev_ioctl+0x96b/0x1860 [ 1619.970027] ? blkpg_ioctl+0x980/0x980 [ 1619.973910] ? __might_sleep+0x93/0xb0 [ 1619.977787] ? __fget+0x210/0x370 [ 1619.981229] block_ioctl+0xde/0x120 [ 1619.984841] ? blkdev_fallocate+0x3b0/0x3b0 [ 1619.989151] do_vfs_ioctl+0x7ae/0x1060 [ 1619.993025] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1619.997772] ? lock_downgrade+0x740/0x740 [ 1620.001907] ? ioctl_preallocate+0x1c0/0x1c0 [ 1620.006302] ? __fget+0x237/0x370 [ 1620.009756] ? security_file_ioctl+0x89/0xb0 [ 1620.014150] SyS_ioctl+0x8f/0xc0 [ 1620.017497] ? do_vfs_ioctl+0x1060/0x1060 [ 1620.021632] do_syscall_64+0x1e8/0x640 [ 1620.025506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1620.030352] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1620.035526] RIP: 0033:0x45a4e7 [ 1620.038716] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1620.046440] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1620.053711] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1620.061495] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1620.068763] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1620.076897] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1620.088289] hfsplus: session requires an argument [ 1620.093972] hfsplus: unable to parse mount options 01:38:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="0d00000000003639408fa3a3ba27660199159dffcf1e7feef541a3d2ed47be4a5d98d40b25218605ba97f593ecb4fafc822dfc9d35b2783dda1b0816722db3c91e6d5401790c01a40fe1b4be51d2d59c24e07d5f1991a298f71d69f0c8c4435cde565686eb23fe924640f2c3db27c596cb", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:38:38 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r0 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, r0) 01:38:38 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3fa", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = getpgid(r5) r7 = geteuid() r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r11, 0x0, r10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r13, 0x0, r12) r14 = getuid() r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r16) r17 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) r18 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x80800) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r20, 0x0, r19) r21 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)=0x0) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r24) r25 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r26) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)=0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r30 = fcntl$dupfd(r29, 0x0, r28) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r30, 0xb704, &(0x7f0000000600)=0x0) r32 = getegid() sendmsg$netlink(r4, &(0x7f0000000740)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x100100000}, 0xc, &(0x7f0000000080)=[{&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x208}], 0x1, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {r6, r7, r9}}}, @rights={{0x20, 0x1, 0x1, [r1, r10, r13, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r14, r16}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x18, 0x1, 0x1, [r17, r18]}}, @rights={{0x24, 0x1, 0x1, [r2, r1, r19, r2, r21]}}, @cred={{0x1c, 0x1, 0x2, {r22, r24, r26}}}, @cred={{0x1c, 0x1, 0x2, {r27, r31, r32}}}], 0xf8, 0x1}, 0x80) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x1, 0x6) 01:38:38 executing program 3 (fault-call:4 fault-nth:29): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1622.386608] FAULT_INJECTION: forcing a failure. [ 1622.386608] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.412157] CPU: 1 PID: 17633 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1622.420357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1622.430006] Call Trace: [ 1622.433546] dump_stack+0x142/0x197 [ 1622.437197] should_fail.cold+0x10f/0x159 [ 1622.441367] should_failslab+0xdb/0x130 [ 1622.446657] kmem_cache_alloc_node_trace+0x280/0x770 [ 1622.446673] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1622.446687] __kmalloc_node_track_caller+0x3d/0x80 [ 1622.461354] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1622.461368] __alloc_skb+0xcf/0x500 [ 1622.461376] ? skb_trim+0x180/0x180 [ 1622.461386] ? netlink_has_listeners+0x20a/0x330 [ 1622.461399] kobject_uevent_env+0x781/0xc23 [ 1622.461415] kobject_uevent+0x20/0x26 [ 1622.475517] lo_ioctl+0x11e7/0x1ce0 [ 1622.475531] ? loop_probe+0x160/0x160 [ 1622.475543] blkdev_ioctl+0x96b/0x1860 [ 1622.475552] ? blkpg_ioctl+0x980/0x980 [ 1622.475567] ? __might_sleep+0x93/0xb0 [ 1622.475578] ? __fget+0x210/0x370 [ 1622.508461] block_ioctl+0xde/0x120 [ 1622.518249] ? blkdev_fallocate+0x3b0/0x3b0 01:38:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1622.518262] do_vfs_ioctl+0x7ae/0x1060 [ 1622.518273] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1622.518286] ? lock_downgrade+0x740/0x740 [ 1622.551097] ? ioctl_preallocate+0x1c0/0x1c0 [ 1622.560730] ? __fget+0x237/0x370 [ 1622.564178] ? security_file_ioctl+0x89/0xb0 [ 1622.568578] SyS_ioctl+0x8f/0xc0 [ 1622.573674] ? do_vfs_ioctl+0x1060/0x1060 [ 1622.578188] do_syscall_64+0x1e8/0x640 [ 1622.582068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1622.587318] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1622.592506] RIP: 0033:0x45a4e7 [ 1622.595695] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1622.603650] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1622.610906] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1622.618442] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1622.626263] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 01:38:39 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r0 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, r0) 01:38:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1622.633901] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1622.685433] hfsplus: session requires an argument [ 1622.709356] hfsplus: unable to parse mount options 01:38:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0x80, 0x1, 0x5, 0x1000}, {0x7f, 0x2, 0x81, 0x1}, {0x1000, 0x80, 0x7, 0x6}, {0x7fff, 0x0, 0x67, 0x6}, {0x8a1, 0x1, 0x3, 0x1}, {0x4911, 0x7, 0x81, 0x5}, {0x8, 0x7, 0x8, 0x137d0424}, {0x3ff, 0x3, 0x40, 0x1}, {0x8, 0x20, 0x1f, 0xfb08}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:39 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r0 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, r0) 01:38:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:41 executing program 5: 01:38:41 executing program 3 (fault-call:4 fault-nth:30): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:41 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:41 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1625.387706] FAULT_INJECTION: forcing a failure. [ 1625.387706] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.410178] CPU: 1 PID: 17708 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1625.418314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.427683] Call Trace: [ 1625.430383] dump_stack+0x142/0x197 [ 1625.435782] should_fail.cold+0x10f/0x159 [ 1625.439947] should_failslab+0xdb/0x130 [ 1625.444961] kmem_cache_alloc_node+0x287/0x780 [ 1625.449557] __alloc_skb+0x9c/0x500 [ 1625.453190] ? skb_trim+0x180/0x180 [ 1625.456833] ? netlink_has_listeners+0x20a/0x330 [ 1625.461597] kobject_uevent_env+0x781/0xc23 [ 1625.465916] kobject_uevent+0x20/0x26 [ 1625.469718] lo_ioctl+0x11e7/0x1ce0 [ 1625.473875] ? loop_probe+0x160/0x160 [ 1625.477693] blkdev_ioctl+0x96b/0x1860 [ 1625.481600] ? blkpg_ioctl+0x980/0x980 01:38:42 executing program 5: [ 1625.485589] ? __might_sleep+0x93/0xb0 [ 1625.489483] ? __fget+0x210/0x370 [ 1625.492968] block_ioctl+0xde/0x120 [ 1625.496690] ? blkdev_fallocate+0x3b0/0x3b0 [ 1625.501016] do_vfs_ioctl+0x7ae/0x1060 [ 1625.504906] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1625.509747] ? lock_downgrade+0x740/0x740 [ 1625.513884] ? ioctl_preallocate+0x1c0/0x1c0 [ 1625.518329] ? __fget+0x237/0x370 [ 1625.522243] ? security_file_ioctl+0x89/0xb0 [ 1625.526670] SyS_ioctl+0x8f/0xc0 [ 1625.530033] ? do_vfs_ioctl+0x1060/0x1060 [ 1625.534294] do_syscall_64+0x1e8/0x640 01:38:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:42 executing program 5: [ 1625.538183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1625.543034] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1625.548481] RIP: 0033:0x45a4e7 [ 1625.551667] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1625.559464] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1625.566736] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1625.574098] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1625.581367] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 01:38:42 executing program 5: 01:38:42 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1625.588727] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1625.660447] hfsplus: session requires an argument [ 1625.681832] hfsplus: unable to parse mount options 01:38:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0xc8730d3b9cfc0180) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r4, 0x0, 0x0) 01:38:42 executing program 5: 01:38:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:42 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:42 executing program 3 (fault-call:4 fault-nth:31): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:42 executing program 5: [ 1625.906339] FAULT_INJECTION: forcing a failure. [ 1625.906339] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.936071] CPU: 1 PID: 17751 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1625.944522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.954317] Call Trace: [ 1625.954343] dump_stack+0x142/0x197 [ 1625.954361] should_fail.cold+0x10f/0x159 [ 1625.954380] should_failslab+0xdb/0x130 [ 1625.960750] kmem_cache_alloc_node+0x287/0x780 [ 1625.960771] __alloc_skb+0x9c/0x500 [ 1625.960781] ? skb_trim+0x180/0x180 [ 1625.960791] ? netlink_has_listeners+0x20a/0x330 [ 1625.960803] kobject_uevent_env+0x781/0xc23 [ 1625.960819] kobject_uevent+0x20/0x26 [ 1625.976735] lo_ioctl+0x11e7/0x1ce0 [ 1625.976751] ? loop_probe+0x160/0x160 01:38:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xffffffffffffff91, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 1625.976764] blkdev_ioctl+0x96b/0x1860 [ 1625.976782] ? blkpg_ioctl+0x980/0x980 [ 1626.014265] ? __might_sleep+0x93/0xb0 [ 1626.018168] ? __fget+0x210/0x370 [ 1626.022610] block_ioctl+0xde/0x120 [ 1626.026253] ? blkdev_fallocate+0x3b0/0x3b0 [ 1626.030594] do_vfs_ioctl+0x7ae/0x1060 [ 1626.035118] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1626.039895] ? lock_downgrade+0x740/0x740 [ 1626.043919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1626.044060] ? ioctl_preallocate+0x1c0/0x1c0 [ 1626.056112] ? __fget+0x237/0x370 [ 1626.056132] ? security_file_ioctl+0x89/0xb0 [ 1626.056146] SyS_ioctl+0x8f/0xc0 [ 1626.056158] ? do_vfs_ioctl+0x1060/0x1060 [ 1626.064483] do_syscall_64+0x1e8/0x640 [ 1626.064495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1626.064513] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1626.064526] RIP: 0033:0x45a4e7 [ 1626.071630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1626.073298] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1626.073310] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1626.073315] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1626.073319] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1626.073325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1626.073331] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1626.124901] hfsplus: session requires an argument [ 1626.156290] input: syz1 as /devices/virtual/input/input54 [ 1626.179547] hfsplus: unable to parse mount options [ 1626.188706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:38:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:45 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/icmp\x00') writev(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)="eb", 0x1}], 0x1) 01:38:45 executing program 3 (fault-call:4 fault-nth:32): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1628.644665] FAULT_INJECTION: forcing a failure. [ 1628.644665] name failslab, interval 1, probability 0, space 0, times 0 [ 1628.688274] CPU: 1 PID: 17795 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1628.696214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1628.705574] Call Trace: [ 1628.708167] dump_stack+0x142/0x197 [ 1628.711800] should_fail.cold+0x10f/0x159 [ 1628.715964] should_failslab+0xdb/0x130 [ 1628.720035] kmem_cache_alloc_node+0x287/0x780 [ 1628.724630] __alloc_skb+0x9c/0x500 [ 1628.728252] ? skb_trim+0x180/0x180 [ 1628.731985] ? netlink_has_listeners+0x20a/0x330 [ 1628.737603] kobject_uevent_env+0x781/0xc23 [ 1628.742085] kobject_uevent+0x20/0x26 [ 1628.746020] lo_ioctl+0x11e7/0x1ce0 [ 1628.749729] ? loop_probe+0x160/0x160 [ 1628.753604] blkdev_ioctl+0x96b/0x1860 [ 1628.757476] ? blkpg_ioctl+0x980/0x980 [ 1628.761555] ? __might_sleep+0x93/0xb0 [ 1628.766319] ? __fget+0x210/0x370 [ 1628.769849] block_ioctl+0xde/0x120 [ 1628.774522] ? blkdev_fallocate+0x3b0/0x3b0 [ 1628.780617] do_vfs_ioctl+0x7ae/0x1060 [ 1628.784508] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1628.789403] ? lock_downgrade+0x740/0x740 [ 1628.793651] ? ioctl_preallocate+0x1c0/0x1c0 [ 1628.798208] ? __fget+0x237/0x370 [ 1628.802136] ? security_file_ioctl+0x89/0xb0 [ 1628.806708] SyS_ioctl+0x8f/0xc0 [ 1628.810673] ? do_vfs_ioctl+0x1060/0x1060 [ 1628.815195] do_syscall_64+0x1e8/0x640 [ 1628.819070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1628.823924] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1628.829108] RIP: 0033:0x45a4e7 [ 1628.832369] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1628.840078] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1628.847435] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1628.855403] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1628.867184] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1628.874638] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3fa", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$bt_BT_RCVMTU(r6, 0x112, 0xd, &(0x7f0000000000)=0xb815, &(0x7f0000000040)=0x2) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:45 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 01:38:45 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1628.894060] hfsplus: session requires an argument [ 1628.900758] hfsplus: unable to parse mount options 01:38:45 executing program 3 (fault-call:4 fault-nth:33): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:45 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4, 0xa00000, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000018b5db71f7f94dde00120108000100736974000c6ea81a58a4e90d2913b75800bc5729b031142aaed5cdce4ee3739fa04ea8e1f7177ade98a2ff4edb3ea29f1b971554e159f90df97f3556d8f3509ddbd16c88471aa703754b6b3d03473438db8c7bc08f0a4c9e8fed66a8a59882ac3134947d6bf82558ca595e3b2f1e5ec74d4a84dc5a", @ANYRES32=r3], 0x38}}, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) ioctl$FS_IOC_GETFLAGS(r4, 0x80046601, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000380)='./file0\x00') close(r7) [ 1629.019038] input: syz1 as /devices/virtual/input/input55 [ 1629.055067] FAULT_INJECTION: forcing a failure. [ 1629.055067] name failslab, interval 1, probability 0, space 0, times 0 01:38:45 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1629.075347] CPU: 1 PID: 17835 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1629.083887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1629.093959] Call Trace: [ 1629.096580] dump_stack+0x142/0x197 [ 1629.096598] should_fail.cold+0x10f/0x159 [ 1629.104407] should_failslab+0xdb/0x130 [ 1629.107597] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1629.108393] kmem_cache_alloc_node_trace+0x280/0x770 [ 1629.108411] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1629.122181] __kmalloc_node_track_caller+0x3d/0x80 [ 1629.122195] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1629.122206] __alloc_skb+0xcf/0x500 [ 1629.122216] ? skb_trim+0x180/0x180 [ 1629.122227] ? netlink_has_listeners+0x20a/0x330 [ 1629.122244] kobject_uevent_env+0x781/0xc23 [ 1629.144521] kobject_uevent+0x20/0x26 [ 1629.144536] lo_ioctl+0x11e7/0x1ce0 [ 1629.144553] ? loop_probe+0x160/0x160 [ 1629.154602] blkdev_ioctl+0x96b/0x1860 [ 1629.154612] ? blkpg_ioctl+0x980/0x980 [ 1629.154627] ? __might_sleep+0x93/0xb0 [ 1629.154637] ? __fget+0x210/0x370 [ 1629.154652] block_ioctl+0xde/0x120 [ 1629.154663] ? blkdev_fallocate+0x3b0/0x3b0 [ 1629.154673] do_vfs_ioctl+0x7ae/0x1060 [ 1629.154689] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1629.169884] ? lock_downgrade+0x740/0x740 [ 1629.169901] ? ioctl_preallocate+0x1c0/0x1c0 [ 1629.169913] ? __fget+0x237/0x370 [ 1629.169928] ? security_file_ioctl+0x89/0xb0 [ 1629.177786] SyS_ioctl+0x8f/0xc0 [ 1629.177798] ? do_vfs_ioctl+0x1060/0x1060 [ 1629.177813] do_syscall_64+0x1e8/0x640 [ 1629.177822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1629.177838] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1629.237287] RIP: 0033:0x45a4e7 [ 1629.240466] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1629.250336] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1629.257726] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1629.264988] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1629.272423] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1629.279691] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1629.292034] hfsplus: session requires an argument [ 1629.297241] hfsplus: unable to parse mount options 01:38:45 executing program 3 (fault-call:4 fault-nth:34): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1629.440941] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1629.471750] FAULT_INJECTION: forcing a failure. [ 1629.471750] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.486481] CPU: 0 PID: 17863 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1629.494391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1629.494399] Call Trace: [ 1629.507424] dump_stack+0x142/0x197 [ 1629.511518] should_fail.cold+0x10f/0x159 [ 1629.515684] should_failslab+0xdb/0x130 [ 1629.519661] kmem_cache_alloc_node_trace+0x280/0x770 [ 1629.519677] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1629.519692] __kmalloc_node_track_caller+0x3d/0x80 [ 1629.519705] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1629.540961] __alloc_skb+0xcf/0x500 [ 1629.544599] ? skb_trim+0x180/0x180 [ 1629.548225] ? netlink_has_listeners+0x20a/0x330 [ 1629.552983] kobject_uevent_env+0x781/0xc23 [ 1629.557316] kobject_uevent+0x20/0x26 [ 1629.561113] lo_ioctl+0x11e7/0x1ce0 [ 1629.564762] ? loop_probe+0x160/0x160 [ 1629.568576] blkdev_ioctl+0x96b/0x1860 [ 1629.572507] ? blkpg_ioctl+0x980/0x980 [ 1629.576386] ? __might_sleep+0x93/0xb0 [ 1629.580258] ? __fget+0x210/0x370 [ 1629.583713] block_ioctl+0xde/0x120 [ 1629.587344] ? blkdev_fallocate+0x3b0/0x3b0 [ 1629.591652] do_vfs_ioctl+0x7ae/0x1060 [ 1629.595530] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1629.600276] ? lock_downgrade+0x740/0x740 [ 1629.604414] ? ioctl_preallocate+0x1c0/0x1c0 [ 1629.608930] ? __fget+0x237/0x370 [ 1629.612386] ? security_file_ioctl+0x89/0xb0 [ 1629.616805] SyS_ioctl+0x8f/0xc0 [ 1629.620181] ? do_vfs_ioctl+0x1060/0x1060 [ 1629.624339] do_syscall_64+0x1e8/0x640 [ 1629.628231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1629.633164] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1629.638340] RIP: 0033:0x45a4e7 [ 1629.641583] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1629.649287] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 000000000045a4e7 [ 1629.657166] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1629.664433] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1629.671688] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1629.678945] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1629.688749] hfsplus: session requires an argument [ 1629.693665] hfsplus: unable to parse mount options 01:38:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:48 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:48 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) umount2(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x30, 0x80001000, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) rmdir(&(0x7f0000000380)='./file0\x00') close(0xffffffffffffffff) [ 1631.720712] input: syz1 as /devices/virtual/input/input56 01:38:48 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) umount2(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x30, 0x80001000, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) rmdir(&(0x7f0000000380)='./file0\x00') close(0xffffffffffffffff) 01:38:48 executing program 3 (fault-call:4 fault-nth:35): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:48 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x800) r5 = dup2(r3, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, 0xffffffffffffffff, 0x8000000000000, &(0x7f0000000000)) ptrace$cont(0x18, r6, 0x1, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r10, 0xc0502100, &(0x7f0000000400)) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setregset(0x4205, r11, 0x201, &(0x7f0000000180)={&(0x7f0000000300)="4336b4e5b6ea3d937e2a218e92d677d17f633d598fe09011796886faefad53d261f5906780419111f5c66951b5561cd5438275c6f00c13b14c652eae2d1e212e333a55d194bb7ecfe11a87c908fc6a6eca3334419913cc39d8bf9887900c8244907ea5d751933aa30986e3ecaff60274145ce50f492f94b58054ded860b47123d953d1b4fd52b8c24387b70b2d7c22f84d31d020581cd7ab25b9df2a8873254d94de7ebce26ef222d67603baa855f549aa8d5e258487006de86e80f4f9de712c181b6179145fae1d3c20fad4454bdf28e81b21fdd5d1866da11ed5e948200501f1f489633b74309764b7", 0xea}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$TIOCGPGRP(r14, 0x540f, &(0x7f0000000140)) ioctl$VIDIOC_STREAMON(r5, 0x40045612, &(0x7f0000000000)=0x9) 01:38:48 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1632.089829] FAULT_INJECTION: forcing a failure. [ 1632.089829] name failslab, interval 1, probability 0, space 0, times 0 [ 1632.134948] CPU: 0 PID: 17904 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1632.142879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1632.152244] Call Trace: [ 1632.154851] dump_stack+0x142/0x197 [ 1632.158759] should_fail.cold+0x10f/0x159 [ 1632.162926] should_failslab+0xdb/0x130 [ 1632.166917] kmem_cache_alloc+0x2d7/0x780 [ 1632.171078] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1632.175936] ? lock_downgrade+0x740/0x740 [ 1632.180090] ? ioctl_preallocate+0x1c0/0x1c0 01:38:48 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1632.184509] getname_flags+0xcb/0x580 [ 1632.188344] SyS_mkdir+0x7e/0x200 [ 1632.191827] ? SyS_mkdirat+0x210/0x210 [ 1632.195731] ? do_syscall_64+0x53/0x640 [ 1632.199728] ? SyS_mkdirat+0x210/0x210 [ 1632.203627] do_syscall_64+0x1e8/0x640 [ 1632.207534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1632.212481] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1632.217679] RIP: 0033:0x459a97 [ 1632.220874] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 01:38:48 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1632.228598] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1632.235878] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1632.243175] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1632.252890] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1632.260184] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:51 executing program 5: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:51 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:51 executing program 3 (fault-call:4 fault-nth:36): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:51 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1634.789293] FAULT_INJECTION: forcing a failure. [ 1634.789293] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1634.801139] CPU: 0 PID: 17954 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1634.809829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.819191] Call Trace: [ 1634.821797] dump_stack+0x142/0x197 [ 1634.825434] should_fail.cold+0x10f/0x159 [ 1634.825451] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1634.825462] ? fs_reclaim_acquire+0x20/0x20 01:38:51 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1634.825474] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1634.834304] cache_grow_begin+0x80/0x400 [ 1634.834319] kmem_cache_alloc+0x6a6/0x780 [ 1634.834329] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1634.834342] ? lock_downgrade+0x740/0x740 [ 1634.860767] getname_flags+0xcb/0x580 [ 1634.864585] SyS_mkdir+0x7e/0x200 [ 1634.868074] ? SyS_mkdirat+0x210/0x210 [ 1634.871966] ? do_syscall_64+0x53/0x640 [ 1634.875951] ? SyS_mkdirat+0x210/0x210 [ 1634.879851] do_syscall_64+0x1e8/0x640 [ 1634.883758] ? trace_hardirqs_off_thunk+0x1a/0x1c 01:38:51 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1634.888621] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1634.893832] RIP: 0033:0x459a97 [ 1634.897024] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1634.904736] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1634.912022] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1634.919292] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1634.919299] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1634.933975] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:51 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1634.976614] hfsplus: session requires an argument [ 1634.986408] hfsplus: unable to parse mount options 01:38:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000000)={0x3a}) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:51 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:51 executing program 3 (fault-call:4 fault-nth:37): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) [ 1635.173921] input: syz1 as /devices/virtual/input/input60 [ 1635.180406] FAULT_INJECTION: forcing a failure. [ 1635.180406] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.210950] CPU: 1 PID: 18007 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1635.218882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.228249] Call Trace: [ 1635.230856] dump_stack+0x142/0x197 [ 1635.234504] should_fail.cold+0x10f/0x159 [ 1635.238673] should_failslab+0xdb/0x130 [ 1635.242682] kmem_cache_alloc+0x2d7/0x780 [ 1635.246831] ? __d_lookup+0x3a2/0x670 [ 1635.250643] ? mark_held_locks+0xb1/0x100 [ 1635.254800] ? d_lookup+0xe5/0x240 [ 1635.258337] __d_alloc+0x2d/0x9f0 [ 1635.261788] d_alloc+0x4d/0x270 [ 1635.265071] __lookup_hash+0x58/0x180 [ 1635.268856] filename_create+0x16c/0x430 [ 1635.272953] ? kern_path_mountpoint+0x40/0x40 [ 1635.277443] SyS_mkdir+0x92/0x200 [ 1635.280895] ? SyS_mkdirat+0x210/0x210 [ 1635.284785] ? do_syscall_64+0x53/0x640 [ 1635.288753] ? SyS_mkdirat+0x210/0x210 [ 1635.292625] do_syscall_64+0x1e8/0x640 [ 1635.296504] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1635.301356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1635.306566] RIP: 0033:0x459a97 [ 1635.309751] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1635.317615] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1635.324969] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1635.332239] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1635.339503] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1635.346775] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(0x0, 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:54 executing program 3 (fault-call:4 fault-nth:38): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:54 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcf") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:54 executing program 5: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1638.001858] input: syz1 as /devices/virtual/input/input61 [ 1638.002315] FAULT_INJECTION: forcing a failure. [ 1638.002315] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.058921] CPU: 0 PID: 18032 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1638.066851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1638.076302] Call Trace: [ 1638.076329] dump_stack+0x142/0x197 [ 1638.076346] should_fail.cold+0x10f/0x159 [ 1638.076361] should_failslab+0xdb/0x130 [ 1638.076370] kmem_cache_alloc+0x2d7/0x780 [ 1638.076382] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1638.076399] ? ext4_sync_fs+0x800/0x800 [ 1638.082653] ext4_alloc_inode+0x1d/0x610 [ 1638.082667] alloc_inode+0x64/0x180 [ 1638.082676] new_inode_pseudo+0x19/0xf0 [ 1638.082687] new_inode+0x1f/0x40 [ 1638.090802] __ext4_new_inode+0x32c/0x4860 [ 1638.090820] ? avc_has_perm+0x2df/0x4b0 [ 1638.090831] ? ext4_free_inode+0x1210/0x1210 [ 1638.090849] ? __irqentry_text_end+0x11a53/0x1f9dc3 [ 1638.090860] ? dquot_get_next_dqblk+0x160/0x160 [ 1638.090879] ext4_mkdir+0x331/0xc20 [ 1638.100602] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 1638.100619] ? security_inode_mkdir+0xd0/0x110 [ 1638.100632] vfs_mkdir+0x3ca/0x610 01:38:54 executing program 5: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1638.100644] SyS_mkdir+0x1b7/0x200 [ 1638.100654] ? SyS_mkdirat+0x210/0x210 [ 1638.108708] ? do_syscall_64+0x53/0x640 [ 1638.108722] ? SyS_mkdirat+0x210/0x210 [ 1638.108733] do_syscall_64+0x1e8/0x640 [ 1638.108743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1638.108760] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1638.116340] RIP: 0033:0x459a97 [ 1638.116345] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1638.116357] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 01:38:54 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcf") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(0x0, 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:54 executing program 3 (fault-call:4 fault-nth:39): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1638.116362] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1638.116366] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1638.116380] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1638.123967] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) wait4(r4, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x7, 0x100000) tkill(r3, 0x3c) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000000)={0xffffffffffffff6b, 0x37, 0x9, {0x6, 0xfff, 0x4, r5}}, 0x1e) ptrace$cont(0x1a, r3, 0x2000000000013b, 0x2000000000) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x81, 0xc0, 0xf8, 0x9, 0x0, 0xb1, 0xfe, 0xfe, 0x1f, 0x4}, 0xb) ptrace$cont(0x18, r3, 0x0, 0x0) r6 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) r7 = getuid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r13, 0x54a2) setuid(r10) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000300)=0x0) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000340)={{0x6db5, r7, r8, r10, 0xee01, 0x100, 0x8000}, 0x0, 0x10000, 0x0, 0x12, r14, r5, 0x21c}) 01:38:54 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcf") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r4, &(0x7f0000000080)='net/netstat\x00') tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1638.365114] FAULT_INJECTION: forcing a failure. [ 1638.365114] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.415918] input: syz1 as /devices/virtual/input/input62 [ 1638.417113] CPU: 1 PID: 18068 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1638.429590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1638.438964] Call Trace: [ 1638.441569] dump_stack+0x142/0x197 [ 1638.441593] should_fail.cold+0x10f/0x159 [ 1638.441610] should_failslab+0xdb/0x130 [ 1638.453343] kmem_cache_alloc+0x2d7/0x780 [ 1638.453356] ? __debug_object_init+0x171/0x8e0 [ 1638.453382] ? ext4_alloc_inode+0x1d/0x610 [ 1638.453407] selinux_inode_alloc_security+0xb6/0x2a0 [ 1638.462154] security_inode_alloc+0x94/0xd0 [ 1638.462177] inode_init_always+0x552/0xaf0 [ 1638.475945] alloc_inode+0x81/0x180 [ 1638.475959] new_inode_pseudo+0x19/0xf0 [ 1638.475970] new_inode+0x1f/0x40 [ 1638.475981] __ext4_new_inode+0x32c/0x4860 [ 1638.476002] ? avc_has_perm+0x2df/0x4b0 [ 1638.483888] ? ext4_free_inode+0x1210/0x1210 [ 1638.483905] ? dquot_get_next_dqblk+0x160/0x160 [ 1638.509202] ext4_mkdir+0x331/0xc20 [ 1638.512870] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 1638.517559] ? security_inode_mkdir+0xd0/0x110 [ 1638.522771] vfs_mkdir+0x3ca/0x610 [ 1638.526324] SyS_mkdir+0x1b7/0x200 [ 1638.529879] ? SyS_mkdirat+0x210/0x210 [ 1638.533796] ? do_syscall_64+0x53/0x640 [ 1638.533810] ? SyS_mkdirat+0x210/0x210 [ 1638.533820] do_syscall_64+0x1e8/0x640 [ 1638.533831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1638.541800] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1638.541811] RIP: 0033:0x459a97 [ 1638.541817] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1638.541828] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1638.541834] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1638.541839] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1638.541843] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1638.541848] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:38:57 executing program 5: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:57 executing program 3 (fault-call:4 fault-nth:40): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:57 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(0x0, 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1641.047198] input: syz1 as /devices/virtual/input/input63 [ 1641.077374] FAULT_INJECTION: forcing a failure. [ 1641.077374] name failslab, interval 1, probability 0, space 0, times 0 [ 1641.108030] CPU: 0 PID: 18103 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1641.116100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1641.125484] Call Trace: [ 1641.128762] dump_stack+0x142/0x197 [ 1641.132636] should_fail.cold+0x10f/0x159 [ 1641.136833] should_failslab+0xdb/0x130 [ 1641.140840] kmem_cache_alloc+0x2d7/0x780 [ 1641.145271] ? __debug_object_init+0x171/0x8e0 [ 1641.149915] ? ext4_alloc_inode+0x1d/0x610 [ 1641.154183] selinux_inode_alloc_security+0xb6/0x2a0 [ 1641.159654] security_inode_alloc+0x94/0xd0 [ 1641.164096] inode_init_always+0x552/0xaf0 [ 1641.168451] alloc_inode+0x81/0x180 [ 1641.172098] new_inode_pseudo+0x19/0xf0 [ 1641.176688] new_inode+0x1f/0x40 [ 1641.180058] __ext4_new_inode+0x32c/0x4860 [ 1641.180076] ? avc_has_perm+0x2df/0x4b0 [ 1641.180085] ? ext4_free_inode+0x1210/0x1210 [ 1641.180100] ? dquot_get_next_dqblk+0x160/0x160 [ 1641.180117] ext4_mkdir+0x331/0xc20 [ 1641.180133] ? ext4_init_dot_dotdot+0x4c0/0x4c0 01:38:57 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1641.180145] ? security_inode_mkdir+0xd0/0x110 [ 1641.180159] vfs_mkdir+0x3ca/0x610 [ 1641.180172] SyS_mkdir+0x1b7/0x200 [ 1641.217631] ? SyS_mkdirat+0x210/0x210 [ 1641.221535] ? do_syscall_64+0x53/0x640 [ 1641.225609] ? SyS_mkdirat+0x210/0x210 [ 1641.229512] do_syscall_64+0x1e8/0x640 [ 1641.233417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1641.238374] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1641.243569] RIP: 0033:0x459a97 [ 1641.246856] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 01:38:57 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="7d000005001d009a3131245637c62d58da27c0debbbf4a8151abf1f884ed3b9ce6119c1a3e543c009d9a36caef18f7a5400c62bf8ee62f1925bd483615b0a42b92f6b9f75b908be332e3942e92fae95982a1609250b5a6532d4be67f1c5de779078062c9cdd186326893be8a6d650ffcebd136c16c89f1ccbbcb9ed1d4b3f33089b9b7b980a1b8c37eac8d07b01d5dbd8a53311cb61c059499d272c0dea9fada36219d"], 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:38:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1641.254573] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1641.262536] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1641.271233] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1641.278656] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1641.278666] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:38:57 executing program 3 (fault-call:4 fault-nth:41): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:38:57 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:38:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x5, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r13, 0x800448d2, &(0x7f0000000580)={0x1bacf914c1bac80, &(0x7f0000000380)}) getsockname$packet(r7, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x0, 0x20000}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="af3acb58fc1dea95fd3234c06f11f417"}]}}}]}, 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000011000104000000000000000002000000", @ANYRES32=r14], 0x2}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'veth1_to_team\x00', r14}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000540)='veth1_to_team\x00') wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) ptrace$setopts(0x4200, r3, 0x0, 0xa) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1641.491412] input: syz1 as /devices/virtual/input/input64 [ 1641.534300] FAULT_INJECTION: forcing a failure. [ 1641.534300] name failslab, interval 1, probability 0, space 0, times 0 [ 1641.557654] CPU: 1 PID: 18148 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1641.566040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1641.575604] Call Trace: [ 1641.578299] dump_stack+0x142/0x197 [ 1641.581969] should_fail.cold+0x10f/0x159 [ 1641.586154] should_failslab+0xdb/0x130 [ 1641.590153] __kmalloc+0x2f0/0x7a0 [ 1641.593723] ? check_preemption_disabled+0x3c/0x250 [ 1641.598854] ? ext4_find_extent+0x709/0x960 [ 1641.603220] ext4_find_extent+0x709/0x960 [ 1641.607510] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1641.612965] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 1641.617618] ? save_trace+0x290/0x290 [ 1641.621443] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1641.627761] ? __lock_is_held+0xb6/0x140 [ 1641.632958] ? lock_acquire+0x16f/0x430 [ 1641.638251] ? ext4_map_blocks+0x829/0x17c0 [ 1641.645301] ext4_map_blocks+0x881/0x17c0 [ 1641.652874] ? ext4_issue_zeroout+0x160/0x160 [ 1641.659797] ? __brelse+0x50/0x60 [ 1641.663775] ext4_getblk+0xac/0x450 [ 1641.667817] ? ext4_iomap_begin+0x8a0/0x8a0 [ 1641.672744] ? ext4_free_inode+0x1210/0x1210 [ 1641.677849] ext4_bread+0x6e/0x1a0 [ 1641.681382] ? ext4_getblk+0x450/0x450 [ 1641.685289] ext4_append+0x14b/0x360 [ 1641.692375] ext4_mkdir+0x531/0xc20 [ 1641.695991] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 1641.700654] ? security_inode_mkdir+0xd0/0x110 [ 1641.705246] vfs_mkdir+0x3ca/0x610 [ 1641.708796] SyS_mkdir+0x1b7/0x200 [ 1641.712412] ? SyS_mkdirat+0x210/0x210 [ 1641.716307] ? do_syscall_64+0x53/0x640 [ 1641.720279] ? SyS_mkdirat+0x210/0x210 [ 1641.724154] do_syscall_64+0x1e8/0x640 [ 1641.728052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1641.732900] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1641.738107] RIP: 0033:0x459a97 [ 1641.741890] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1641.749591] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1641.756865] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1641.765987] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1641.773469] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1641.781886] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:00 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba0", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:00 executing program 3 (fault-call:4 fault-nth:42): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:00 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1644.215027] input: syz1 as /devices/virtual/input/input65 [ 1644.217123] FAULT_INJECTION: forcing a failure. [ 1644.217123] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.262551] CPU: 1 PID: 18172 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1644.271018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1644.280583] Call Trace: [ 1644.283188] dump_stack+0x142/0x197 [ 1644.286833] should_fail.cold+0x10f/0x159 [ 1644.291002] should_failslab+0xdb/0x130 [ 1644.294993] __kmalloc+0x2f0/0x7a0 [ 1644.298548] ? check_preemption_disabled+0x3c/0x250 [ 1644.303595] ? ext4_find_extent+0x709/0x960 [ 1644.307933] ext4_find_extent+0x709/0x960 [ 1644.312100] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1644.317657] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 1644.322178] ? save_trace+0x290/0x290 [ 1644.326002] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1644.331228] ? __lock_is_held+0xb6/0x140 [ 1644.335407] ? lock_acquire+0x16f/0x430 [ 1644.339404] ? ext4_map_blocks+0x829/0x17c0 [ 1644.343755] ext4_map_blocks+0x881/0x17c0 [ 1644.347941] ? ext4_issue_zeroout+0x160/0x160 [ 1644.352806] ? __brelse+0x50/0x60 [ 1644.360487] ext4_getblk+0xac/0x450 [ 1644.364255] ? ext4_iomap_begin+0x8a0/0x8a0 [ 1644.368603] ? ext4_free_inode+0x1210/0x1210 [ 1644.373126] ext4_bread+0x6e/0x1a0 [ 1644.377144] ? ext4_getblk+0x450/0x450 [ 1644.382309] ext4_append+0x14b/0x360 [ 1644.386184] ext4_mkdir+0x531/0xc20 [ 1644.390018] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 1644.394721] ? security_inode_mkdir+0xd0/0x110 [ 1644.400980] vfs_mkdir+0x3ca/0x610 [ 1644.405610] SyS_mkdir+0x1b7/0x200 [ 1644.409270] ? SyS_mkdirat+0x210/0x210 [ 1644.413181] ? do_syscall_64+0x53/0x640 [ 1644.417872] ? SyS_mkdirat+0x210/0x210 [ 1644.421779] do_syscall_64+0x1e8/0x640 [ 1644.425696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1644.430584] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1644.435962] RIP: 0033:0x459a97 [ 1644.439164] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1644.446909] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1644.454308] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1644.461678] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1644.468957] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1644.476244] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:01 executing program 3 (fault-call:4 fault-nth:43): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:01 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1644.641276] FAULT_INJECTION: forcing a failure. [ 1644.641276] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.665173] CPU: 0 PID: 18188 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1644.673106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1644.682488] Call Trace: [ 1644.682510] dump_stack+0x142/0x197 [ 1644.682528] should_fail.cold+0x10f/0x159 [ 1644.682544] should_failslab+0xdb/0x130 [ 1644.682552] __kmalloc+0x2f0/0x7a0 [ 1644.682567] ? check_preemption_disabled+0x3c/0x250 [ 1644.705721] ? ext4_find_extent+0x709/0x960 [ 1644.710059] ext4_find_extent+0x709/0x960 [ 1644.714233] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1644.719703] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 1644.724209] ? save_trace+0x290/0x290 [ 1644.724227] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1644.724238] ? __lock_is_held+0xb6/0x140 [ 1644.733049] ? lock_acquire+0x16f/0x430 [ 1644.733060] ? ext4_map_blocks+0x829/0x17c0 [ 1644.733077] ext4_map_blocks+0x881/0x17c0 [ 1644.742758] ? ext4_issue_zeroout+0x160/0x160 [ 1644.742767] ? __brelse+0x50/0x60 [ 1644.742782] ext4_getblk+0xac/0x450 [ 1644.751275] ? ext4_iomap_begin+0x8a0/0x8a0 [ 1644.762701] input: syz1 as /devices/virtual/input/input66 [ 1644.762839] ? ext4_free_inode+0x1210/0x1210 [ 1644.777248] ext4_bread+0x6e/0x1a0 [ 1644.777261] ? ext4_getblk+0x450/0x450 [ 1644.777275] ext4_append+0x14b/0x360 [ 1644.788584] ext4_mkdir+0x531/0xc20 [ 1644.792331] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 1644.797023] ? security_inode_mkdir+0xd0/0x110 [ 1644.801625] vfs_mkdir+0x3ca/0x610 [ 1644.805314] SyS_mkdir+0x1b7/0x200 [ 1644.808876] ? SyS_mkdirat+0x210/0x210 [ 1644.812782] ? do_syscall_64+0x53/0x640 [ 1644.816777] ? SyS_mkdirat+0x210/0x210 [ 1644.820722] do_syscall_64+0x1e8/0x640 [ 1644.824637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1644.829754] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1644.835043] RIP: 0033:0x459a97 [ 1644.838237] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1644.838248] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1644.838253] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1644.838259] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1644.838265] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1644.838271] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:01 executing program 3 (fault-call:4 fault-nth:44): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:01 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1644.969130] FAULT_INJECTION: forcing a failure. [ 1644.969130] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.006629] CPU: 0 PID: 18202 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1645.014571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1645.024033] Call Trace: [ 1645.026639] dump_stack+0x142/0x197 [ 1645.030286] should_fail.cold+0x10f/0x159 [ 1645.034451] should_failslab+0xdb/0x130 [ 1645.038594] kmem_cache_alloc+0x2d7/0x780 [ 1645.042794] ? rcu_read_lock_sched_held+0x110/0x130 [ 1645.047859] ? __mark_inode_dirty+0x2b7/0x1040 [ 1645.052475] ext4_mb_new_blocks+0x513/0x3b30 [ 1645.057099] ? ext4_find_extent+0x709/0x960 [ 1645.061591] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 1645.066221] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1645.071257] ? __lock_is_held+0xb6/0x140 [ 1645.075349] ? lock_acquire+0x16f/0x430 [ 1645.079363] ext4_map_blocks+0x881/0x17c0 [ 1645.083715] ? ext4_issue_zeroout+0x160/0x160 [ 1645.088227] ? __brelse+0x50/0x60 [ 1645.091708] ext4_getblk+0xac/0x450 [ 1645.096235] ? ext4_iomap_begin+0x8a0/0x8a0 [ 1645.101392] ? ext4_free_inode+0x1210/0x1210 [ 1645.105916] ext4_bread+0x6e/0x1a0 [ 1645.109487] ? ext4_getblk+0x450/0x450 [ 1645.113413] ext4_append+0x14b/0x360 [ 1645.117356] ext4_mkdir+0x531/0xc20 [ 1645.121019] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 1645.125816] ? security_inode_mkdir+0xd0/0x110 [ 1645.130416] vfs_mkdir+0x3ca/0x610 [ 1645.133975] SyS_mkdir+0x1b7/0x200 [ 1645.137536] ? SyS_mkdirat+0x210/0x210 [ 1645.141700] ? do_syscall_64+0x53/0x640 [ 1645.145705] ? SyS_mkdirat+0x210/0x210 [ 1645.149617] do_syscall_64+0x1e8/0x640 [ 1645.153531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1645.158483] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1645.163707] RIP: 0033:0x459a97 [ 1645.166903] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1645.175241] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1645.182522] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1645.189803] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1645.197084] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1645.204536] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r1) 01:39:01 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1645.354159] input: syz1 as /devices/virtual/input/input67 01:39:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:03 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r1) 01:39:03 executing program 3 (fault-call:4 fault-nth:45): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba0", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1647.263493] FAULT_INJECTION: forcing a failure. [ 1647.263493] name failslab, interval 1, probability 0, space 0, times 0 [ 1647.275418] CPU: 1 PID: 18233 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1647.283344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1647.292719] Call Trace: [ 1647.295420] dump_stack+0x142/0x197 [ 1647.299067] should_fail.cold+0x10f/0x159 [ 1647.303257] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 1647.308211] should_failslab+0xdb/0x130 [ 1647.312463] kmem_cache_alloc+0x47/0x780 [ 1647.316542] ? ext4_es_can_be_merged+0x16e/0x230 [ 1647.321339] __es_insert_extent+0x26c/0xe60 [ 1647.325687] ext4_es_insert_extent+0x1f0/0x590 [ 1647.330300] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 1647.336110] ext4_map_blocks+0xab1/0x17c0 [ 1647.336133] ? ext4_issue_zeroout+0x160/0x160 [ 1647.336144] ? __brelse+0x50/0x60 [ 1647.336163] ext4_getblk+0xac/0x450 [ 1647.351885] ? ext4_iomap_begin+0x8a0/0x8a0 [ 1647.356229] ? ext4_free_inode+0x1210/0x1210 [ 1647.360659] ext4_bread+0x6e/0x1a0 [ 1647.364216] ? ext4_getblk+0x450/0x450 [ 1647.368150] ext4_append+0x14b/0x360 [ 1647.371885] ext4_mkdir+0x531/0xc20 [ 1647.375542] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 1647.380236] ? security_inode_mkdir+0xd0/0x110 [ 1647.384913] vfs_mkdir+0x3ca/0x610 [ 1647.384928] SyS_mkdir+0x1b7/0x200 [ 1647.384940] ? SyS_mkdirat+0x210/0x210 [ 1647.384955] ? do_syscall_64+0x53/0x640 [ 1647.399916] ? SyS_mkdirat+0x210/0x210 [ 1647.403816] do_syscall_64+0x1e8/0x640 [ 1647.407707] ? trace_hardirqs_off_thunk+0x1a/0x1c 01:39:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1647.407728] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1647.407735] RIP: 0033:0x459a97 [ 1647.407742] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1647.427695] input: syz1 as /devices/virtual/input/input68 [ 1647.428642] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459a97 [ 1647.428648] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000080 [ 1647.428654] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1647.428660] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 01:39:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1647.428666] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:04 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r1) 01:39:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r5, 0x10, &(0x7f0000000500)={&(0x7f0000000400)=""/223, 0xdf, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r2, 0x10, &(0x7f0000000580)={&(0x7f0000000300)=""/209, 0xd1, r6}}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000600)={0x200, 0x4f, 0x3ff}) r7 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xf, r7, 0x5, &(0x7f0000000100)="a09b30898c39fc76b6b3ad797a908e77402a8ef9323cf472d82abf22346414ce5167ce07584de0eb7086a39ed482f1") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$EVIOCGBITSW(r10, 0x80404525, &(0x7f0000000140)=""/90) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000000)="259c705a238ffea2a1e62682768c5dad65ffb2ac93856af85e5d349f875a064a96a31eef3916ba042e09fe48756580f0ae929a196a5a33f7829c500b97363f6584f212eb7124d07f86fdabf93292ff55c1ccad08ea2343ea909a9d8495732e6704eb07f94309d4ed12f551c2e1760c27666b453215d7be620d28cba4754042688a184aa8071b65014ac5") ptrace$cont(0x18, r7, 0x0, 0x0) 01:39:04 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1647.669652] input: syz1 as /devices/virtual/input/input69 01:39:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)) dup2(0xffffffffffffffff, r1) 01:39:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$selinux_attr(r6, &(0x7f0000000000)='system_u:object_r:etc_runtime_t:s0\x00', 0x23) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x17, 0x80, 0x7, 0x30, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_x_sec_ctx={0x12, 0x18, 0x98, 0x2, 0x81, "560c8cf9ee1f9dd0310d82154916d735f91df090c35ed1424c17aaf50d9c5a57f4280f586a5d9809b0ad151485ecbc38575f3d60c86268c21934bb578d53eda52c8d5edafce6a4d1f8f2a3f30bedb0bd9487313e7555f7499ec86e64323ae967465f81ab7d09e12ffa1c6ac90e0654583154589a2a91c1eb7725c7752e1069820c"}, @sadb_sa={0x2, 0x1, 0x4d2, 0x80, 0x1f, 0x1f, 0x0, 0x1}, @sadb_key={0x12, 0x9, 0x408, 0x0, "288fc1428285f54e2f025d3d7d0eaea1b148a06072b03d0207a35b2f256183e0edb97812d507af40b0baa78d4e93701e34a20fd443f7850dd85e76108f719babbb39b10f40c8201f927ae037c6b19e57613e46509d42ab84555194c47a12ca482b026c4480156a1029f92d36e2613407bab2aaaa823f785bc90e8db2148e4269e5"}, @sadb_ident={0x2, 0xa, 0x7, 0x0, 0x5}, @sadb_x_nat_t_type={0x1}, @sadb_x_nat_t_type={0x1, 0x14, 0x7}, @sadb_lifetime={0x4, 0x3, 0xfa, 0x7ff, 0x4, 0xc7e}]}, 0x180}}, 0x4050) [ 1647.875173] input: syz1 as /devices/virtual/input/input70 [ 1647.911488] hfsplus: session requires an argument [ 1647.941156] hfsplus: unable to parse mount options 01:39:04 executing program 3 (fault-call:4 fault-nth:46): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1648.045451] FAULT_INJECTION: forcing a failure. [ 1648.045451] name failslab, interval 1, probability 0, space 0, times 0 [ 1648.057314] CPU: 1 PID: 18315 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1648.065308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1648.075357] Call Trace: [ 1648.077954] dump_stack+0x142/0x197 [ 1648.081606] should_fail.cold+0x10f/0x159 [ 1648.085859] should_failslab+0xdb/0x130 [ 1648.089841] __kmalloc_track_caller+0x2ec/0x790 [ 1648.094678] ? dput.part.0+0x170/0x750 [ 1648.100466] ? mntput+0x66/0x90 [ 1648.103865] ? strndup_user+0x62/0xf0 [ 1648.107783] memdup_user+0x26/0xa0 [ 1648.111462] strndup_user+0x62/0xf0 [ 1648.115092] SyS_mount+0x3c/0x120 [ 1648.118557] ? copy_mnt_ns+0x8c0/0x8c0 [ 1648.122659] do_syscall_64+0x1e8/0x640 [ 1648.126552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1648.131410] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1648.136604] RIP: 0033:0x45d0ca [ 1648.139784] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1648.147668] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1648.155081] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1648.163313] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1648.171189] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1648.179974] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba0", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:06 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:06 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)) dup2(0xffffffffffffffff, r1) 01:39:06 executing program 3 (fault-call:4 fault-nth:47): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1650.309631] input: syz1 as /devices/virtual/input/input71 [ 1650.330014] FAULT_INJECTION: forcing a failure. [ 1650.330014] name failslab, interval 1, probability 0, space 0, times 0 [ 1650.367132] CPU: 0 PID: 18333 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1650.375089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1650.384462] Call Trace: [ 1650.387065] dump_stack+0x142/0x197 [ 1650.390712] should_fail.cold+0x10f/0x159 [ 1650.394883] should_failslab+0xdb/0x130 [ 1650.398879] __kmalloc_track_caller+0x2ec/0x790 [ 1650.403593] ? dput.part.0+0x170/0x750 [ 1650.407499] ? mntput+0x66/0x90 [ 1650.407512] ? strndup_user+0x62/0xf0 [ 1650.407525] memdup_user+0x26/0xa0 [ 1650.407536] strndup_user+0x62/0xf0 [ 1650.407547] SyS_mount+0x3c/0x120 [ 1650.414607] ? copy_mnt_ns+0x8c0/0x8c0 [ 1650.414622] do_syscall_64+0x1e8/0x640 [ 1650.414632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1650.414650] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1650.414660] RIP: 0033:0x45d0ca [ 1650.446482] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1650.454285] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca 01:39:07 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1650.461555] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1650.468913] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1650.476326] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1650.483693] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:07 executing program 3 (fault-call:4 fault-nth:48): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)) dup2(0xffffffffffffffff, r1) 01:39:07 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1650.619170] FAULT_INJECTION: forcing a failure. [ 1650.619170] name failslab, interval 1, probability 0, space 0, times 0 [ 1650.632367] CPU: 0 PID: 18356 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1650.640294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1650.650209] Call Trace: [ 1650.652818] dump_stack+0x142/0x197 [ 1650.656913] should_fail.cold+0x10f/0x159 [ 1650.661086] should_failslab+0xdb/0x130 [ 1650.665077] __kmalloc_track_caller+0x2ec/0x790 [ 1650.669870] ? kasan_check_write+0x14/0x20 [ 1650.674110] ? strndup_user+0x62/0xf0 [ 1650.674123] memdup_user+0x26/0xa0 [ 1650.674136] strndup_user+0x62/0xf0 [ 1650.681469] SyS_mount+0x6b/0x120 [ 1650.681477] ? copy_mnt_ns+0x8c0/0x8c0 [ 1650.681489] do_syscall_64+0x1e8/0x640 [ 1650.681498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1650.681515] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1650.681524] RIP: 0033:0x45d0ca [ 1650.709656] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1650.717808] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1650.726518] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1650.734350] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1650.741615] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1650.748972] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(r3, 0x0, 0x8, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000000)=[0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x5, 0x5, 0x4}) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:07 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:09 executing program 5 (fault-call:9 fault-nth:0): pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:39:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) 01:39:09 executing program 3 (fault-call:4 fault-nth:49): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:09 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(0x0, 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) vmsplice(r5, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:09 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(0x0, 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1653.389508] input: syz1 as /devices/virtual/input/input72 [ 1653.446205] FAULT_INJECTION: forcing a failure. [ 1653.446205] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.475763] CPU: 0 PID: 18397 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1653.483706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1653.493278] Call Trace: [ 1653.495898] dump_stack+0x142/0x197 [ 1653.499695] should_fail.cold+0x10f/0x159 [ 1653.504101] should_failslab+0xdb/0x130 [ 1653.508104] kmem_cache_alloc+0x2d7/0x780 [ 1653.512280] ? fs_reclaim_acquire+0x20/0x20 [ 1653.516837] ? find_held_lock+0x35/0x130 [ 1653.521006] getname_flags+0xcb/0x580 [ 1653.524838] user_path_at_empty+0x2f/0x50 [ 1653.529183] do_mount+0x12b/0x27d0 [ 1653.532748] ? copy_mount_options+0x5c/0x2f0 [ 1653.537197] ? rcu_read_lock_sched_held+0x110/0x130 [ 1653.542240] ? copy_mount_string+0x40/0x40 [ 1653.547270] ? _copy_from_user+0x99/0x110 [ 1653.548990] FAULT_INJECTION: forcing a failure. [ 1653.548990] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.551439] ? copy_mount_options+0x1fe/0x2f0 [ 1653.551454] SyS_mount+0xab/0x120 [ 1653.551463] ? copy_mnt_ns+0x8c0/0x8c0 [ 1653.551477] do_syscall_64+0x1e8/0x640 [ 1653.551485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1653.551500] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1653.551508] RIP: 0033:0x45d0ca [ 1653.551519] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1653.600093] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1653.607535] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1653.614960] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1653.622415] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1653.629801] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1653.637358] CPU: 1 PID: 18412 Comm: syz-executor.5 Not tainted 4.14.157-syzkaller #0 01:39:10 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(0x0, 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:10 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1653.645412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1653.645417] Call Trace: [ 1653.645433] dump_stack+0x142/0x197 [ 1653.645448] should_fail.cold+0x10f/0x159 [ 1653.645462] should_failslab+0xdb/0x130 [ 1653.645471] kmem_cache_alloc_node_trace+0x280/0x770 [ 1653.645480] ? release_sock+0x14a/0x1b0 [ 1653.645490] ? trace_hardirqs_on+0xd/0x10 [ 1653.645502] ? __local_bh_enable_ip+0x99/0x1a0 [ 1653.645516] __get_vm_area_node+0xf0/0x340 [ 1653.661453] __vmalloc_node_range+0x9f/0x6a0 [ 1653.661463] ? netlink_sendmsg+0x57c/0xc60 [ 1653.661471] ? __netlink_dump_start+0x740/0x740 [ 1653.661485] vmalloc+0x46/0x50 [ 1653.661494] ? netlink_sendmsg+0x57c/0xc60 [ 1653.661502] netlink_sendmsg+0x57c/0xc60 [ 1653.661515] ? netlink_unicast+0x650/0x650 [ 1653.661530] ? security_socket_sendmsg+0x89/0xb0 [ 1653.661539] ? netlink_unicast+0x650/0x650 [ 1653.661553] sock_sendmsg+0xce/0x110 [ 1653.661563] kernel_sendmsg+0x44/0x50 [ 1653.661574] sock_no_sendpage+0x107/0x130 [ 1653.661583] ? sock_kzfree_s+0x50/0x50 [ 1653.661601] ? pipe_lock+0x63/0x80 [ 1653.661615] kernel_sendpage+0x92/0xf0 [ 1653.661623] ? sock_kzfree_s+0x50/0x50 [ 1653.661634] sock_sendpage+0x8b/0xc0 [ 1653.661644] ? kernel_sendpage+0xf0/0xf0 [ 1653.670010] pipe_to_sendpage+0x242/0x340 [ 1653.670024] ? direct_splice_actor+0x190/0x190 [ 1653.670037] __splice_from_pipe+0x348/0x780 [ 1653.670046] ? direct_splice_actor+0x190/0x190 [ 1653.670060] ? direct_splice_actor+0x190/0x190 [ 1653.670068] splice_from_pipe+0xf0/0x150 [ 1653.670081] ? splice_shrink_spd+0xb0/0xb0 [ 1653.679256] ? security_file_permission+0x89/0x1f0 [ 1653.679271] generic_splice_sendpage+0x3c/0x50 [ 1653.814644] ? splice_from_pipe+0x150/0x150 [ 1653.819054] SyS_splice+0xd92/0x1430 [ 1653.823150] ? __sb_end_write+0xc1/0x100 [ 1653.827403] ? compat_SyS_vmsplice+0x250/0x250 [ 1653.831994] ? do_syscall_64+0x53/0x640 [ 1653.836246] ? compat_SyS_vmsplice+0x250/0x250 [ 1653.840956] do_syscall_64+0x1e8/0x640 [ 1653.845026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1653.849888] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1653.855474] RIP: 0033:0x45a679 [ 1653.859167] RSP: 002b:00007f7672dc6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1653.867253] RAX: ffffffffffffffda RBX: 00007f7672dc6c90 RCX: 000000000045a679 [ 1653.874623] RDX: 0000000000000009 RSI: 0000000000000000 RDI: 0000000000000003 [ 1653.882276] RBP: 000000000075bf20 R08: 0000000080000001 R09: 0000000000000000 [ 1653.889782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7672dc76d4 01:39:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) [ 1653.897050] R13: 00000000004caf4c R14: 00000000004e3610 R15: 000000000000000a [ 1653.906615] syz-executor.5: vmalloc: allocation failure: 4416 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 1653.928441] syz-executor.5 cpuset=syz5 mems_allowed=0-1 01:39:10 executing program 3 (fault-call:4 fault-nth:50): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1653.948196] CPU: 1 PID: 18412 Comm: syz-executor.5 Not tainted 4.14.157-syzkaller #0 [ 1653.956305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1653.966153] Call Trace: [ 1653.968966] dump_stack+0x142/0x197 [ 1653.972890] warn_alloc.cold+0x96/0x1af [ 1653.977237] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 1653.982483] ? release_sock+0x14a/0x1b0 [ 1653.982499] ? trace_hardirqs_on+0xd/0x10 [ 1653.991101] ? __local_bh_enable_ip+0x99/0x1a0 [ 1653.991115] ? __get_vm_area_node+0x27f/0x340 [ 1653.991128] __vmalloc_node_range+0x3c3/0x6a0 [ 1653.991138] ? __netlink_dump_start+0x740/0x740 [ 1653.991151] vmalloc+0x46/0x50 [ 1653.991158] ? netlink_sendmsg+0x57c/0xc60 [ 1653.991165] netlink_sendmsg+0x57c/0xc60 [ 1653.991177] ? netlink_unicast+0x650/0x650 [ 1653.991190] ? security_socket_sendmsg+0x89/0xb0 [ 1654.030850] ? netlink_unicast+0x650/0x650 [ 1654.035109] sock_sendmsg+0xce/0x110 [ 1654.038845] kernel_sendmsg+0x44/0x50 [ 1654.042666] sock_no_sendpage+0x107/0x130 [ 1654.046833] ? sock_kzfree_s+0x50/0x50 [ 1654.051086] ? pipe_lock+0x63/0x80 [ 1654.054658] kernel_sendpage+0x92/0xf0 [ 1654.059133] ? sock_kzfree_s+0x50/0x50 [ 1654.063248] sock_sendpage+0x8b/0xc0 [ 1654.066985] ? kernel_sendpage+0xf0/0xf0 [ 1654.071374] pipe_to_sendpage+0x242/0x340 [ 1654.071388] ? direct_splice_actor+0x190/0x190 [ 1654.071403] __splice_from_pipe+0x348/0x780 [ 1654.071414] ? direct_splice_actor+0x190/0x190 [ 1654.071426] ? direct_splice_actor+0x190/0x190 [ 1654.071434] splice_from_pipe+0xf0/0x150 01:39:10 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) [ 1654.071445] ? splice_shrink_spd+0xb0/0xb0 [ 1654.071459] ? security_file_permission+0x89/0x1f0 [ 1654.071471] generic_splice_sendpage+0x3c/0x50 [ 1654.071481] ? splice_from_pipe+0x150/0x150 [ 1654.071490] SyS_splice+0xd92/0x1430 [ 1654.071499] ? __sb_end_write+0xc1/0x100 [ 1654.071518] ? compat_SyS_vmsplice+0x250/0x250 [ 1654.071527] ? do_syscall_64+0x53/0x640 [ 1654.071537] ? compat_SyS_vmsplice+0x250/0x250 [ 1654.071547] do_syscall_64+0x1e8/0x640 [ 1654.071555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1654.071572] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1654.080429] RIP: 0033:0x45a679 [ 1654.080436] RSP: 002b:00007f7672dc6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1654.080447] RAX: ffffffffffffffda RBX: 00007f7672dc6c90 RCX: 000000000045a679 [ 1654.080453] RDX: 0000000000000009 RSI: 0000000000000000 RDI: 0000000000000003 [ 1654.080459] RBP: 000000000075bf20 R08: 0000000080000001 R09: 0000000000000000 [ 1654.080464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7672dc76d4 [ 1654.080469] R13: 00000000004caf4c R14: 00000000004e3610 R15: 000000000000000a [ 1654.096217] Mem-Info: [ 1654.142643] active_anon:313153 inactive_anon:115418 isolated_anon:0 [ 1654.142643] active_file:2845 inactive_file:6943 isolated_file:0 [ 1654.142643] unevictable:2 dirty:209 writeback:0 unstable:0 [ 1654.142643] slab_reclaimable:15516 slab_unreclaimable:121658 [ 1654.142643] mapped:173750 shmem:116004 pagetables:25295 bounce:0 [ 1654.142643] free:919971 free_pcp:293 free_cma:0 [ 1654.147455] FAULT_INJECTION: forcing a failure. [ 1654.147455] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1654.151615] Node 0 active_anon:1218660kB inactive_anon:401780kB active_file:2720kB inactive_file:14052kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:622584kB dirty:564kB writeback:0kB shmem:403916kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 415744kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1654.154544] CPU: 0 PID: 18431 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1654.154550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1654.154554] Call Trace: [ 1654.154576] dump_stack+0x142/0x197 [ 1654.154594] should_fail.cold+0x10f/0x159 [ 1654.159045] Node 1 active_anon:33952kB inactive_anon:59892kB active_file:8660kB inactive_file:13720kB unevictable:8kB isolated(anon):0kB isolated(file):0kB mapped:72416kB dirty:272kB writeback:0kB shmem:60100kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1654.165603] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1654.165616] ? fs_reclaim_acquire+0x20/0x20 [ 1654.165629] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1654.165651] cache_grow_begin+0x80/0x400 [ 1654.165663] kmem_cache_alloc+0x6a6/0x780 [ 1654.180555] ? __schedule+0x7c0/0x1cd0 [ 1654.180575] getname_flags+0xcb/0x580 [ 1654.180586] ? trace_hardirqs_on_caller+0x400/0x590 [ 1654.180597] user_path_at_empty+0x2f/0x50 [ 1654.180608] do_mount+0x12b/0x27d0 [ 1654.180621] ? copy_mount_string+0x40/0x40 [ 1654.196746] ? copy_mount_options+0x18f/0x2f0 [ 1654.196759] ? __sanitizer_cov_trace_pc+0x31/0x60 [ 1654.196770] ? copy_mount_options+0x1fe/0x2f0 [ 1654.196783] SyS_mount+0xab/0x120 [ 1654.196791] ? copy_mnt_ns+0x8c0/0x8c0 [ 1654.196802] do_syscall_64+0x1e8/0x640 [ 1654.196811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1654.196832] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1654.196843] RIP: 0033:0x45d0ca [ 1654.204449] Node 0 [ 1654.206509] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1654.206520] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1654.206527] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1654.206533] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1654.206539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1654.206543] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1654.260179] hfsplus: session requires an argument [ 1654.284789] DMA free:11056kB min:216kB low:268kB high:320kB active_anon:4280kB inactive_anon:68kB active_file:0kB inactive_file:28kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:32kB pagetables:200kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1654.350435] lowmem_reserve[]: [ 1654.366881] hfsplus: unable to parse mount options [ 1654.368775] 0 [ 1654.437726] input: syz1 as /devices/virtual/input/input73 [ 1654.440918] 2572 [ 1654.456651] 2572 [ 1654.471475] 2572 2572 01:39:11 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) [ 1654.471489] Node 0 DMA32 free:54808kB min:36404kB low:45504kB high:54604kB active_anon:1214480kB inactive_anon:401712kB active_file:2720kB inactive_file:14024kB unevictable:0kB writepending:564kB present:3129332kB managed:2636884kB mlocked:0kB kernel_stack:22080kB pagetables:80664kB bounce:0kB free_pcp:1280kB local_pcp:628kB free_cma:0kB [ 1654.471510] lowmem_reserve[]: 0 0 0 0 0 [ 1654.471530] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1654.471548] lowmem_reserve[]: 0 0 0 0 0 [ 1654.471569] Node 1 Normal free:3612344kB min:53484kB low:66852kB high:80220kB active_anon:33952kB inactive_anon:59892kB active_file:8660kB inactive_file:13720kB unevictable:8kB writepending:272kB present:3932160kB managed:3870192kB mlocked:8kB kernel_stack:14624kB pagetables:20612kB bounce:0kB free_pcp:140kB local_pcp:140kB free_cma:0kB [ 1654.471591] lowmem_reserve[]: 0 0 0 0 0 [ 1654.471610] Node 0 DMA: 6*4kB (UM) 29*8kB (UM) 21*16kB (UME) 21*32kB (UME) 17*64kB (UME) 8*128kB (UE) 2*256kB (UE) 01:39:11 executing program 3 (fault-call:4 fault-nth:51): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000015c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x1b5, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000001600)={0x5, 0x10, 0xfa00, {&(0x7f0000001700), r3}}, 0x18) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r10}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @local}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r10}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f0000001900)={0x14, 0x88, 0xfa00, {r10, 0x22, 0x0, @in={0x2, 0x4e22, @broadcast}}}, 0x90) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) sendmmsg$nfc_llcp(r13, &(0x7f0000001540)=[{&(0x7f0000000040)={0x27, 0x1, 0x0, 0x0, 0x1, 0x2, "59af440df0eeba7c65c00661a2e60a4f9d12c65efd0b812c6406a83aab65357a95714125ada0e8191835753f12dc1aad5e0851232714b9abb578503be88861", 0x32}, 0x60, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000140)={0x1010, 0x109, 0x3, "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"}, 0x1010, 0x20000000}, {&(0x7f0000001180)={0x27, 0x1, 0x2, 0x2, 0x3f, 0x2, "3fe955f05a5faa71ca8e99983a900d91bafa7c416c48ac991413045390533803501b2a02ce08fd545ea0c67569bde8e274cc803b84a529e83e5450f538288b", 0x2e}, 0x60, &(0x7f00000013c0)=[{&(0x7f0000001200)="f96fd97bace6f9be7bc355a8f56191e68445d1232d698defa61edb2a14638442ccd44fbda7a635e8ef442bd0a2c7ea0c1b9f83e98e2d5288ce8491ff90933caadd5a053471d5f325e5ce52fb08b207456e399e6a4311", 0x56}, {&(0x7f0000001280)="f1824710633aab6e127e831ae02059af7aac2fe41a53a1e8abf30e4544246bc1b1461f4a15164594d9e97a7960f3f074dc004a6266ae60657ada512515ed78f46aedad111aa83a7d878c93ef1787fd976e6deee382a62350b1e49b6542cbde1e00da863201c5d15f62662d28d04e2ea17a6e5c15c13950608a62e1a34f077c2f0a372076a5948f452fa67d1266bb77954af75e019ee5000bc3f436c20dc519a1667c1352f0d6cae0d60ec2acbd67a06356cc2044c8ec18a6d4cb6105dfb6693bbb1b2f3ebad23219a808cdfcbc1476aed83256d649840c1af0c7eebd2c59ce96a2ae2e201190ce8e1e228e9547068b13fd3a8c", 0xf3}, {&(0x7f0000001380)="dc6d7dc094290f86d08f00e491a86dfa53ff8a3339d5e5c79bbbfa6a8da04a78eb3505705b9f901acd752d222050e298e58bc33d226943bc91", 0x39}], 0x3, &(0x7f0000001400)={0x108, 0x115, 0x10001, "e62120fd5228586aa43b4274cbcdfdbbbd13e9ce299fa595bb9a77db36f52c0705e46992c84cc05262a6169a935dcddcb1e6bec3dd599e7cecbd8fa835a4b83cf462e559e5c985b309d723412d555259054d0891057b10db49dddf6581cd52e48d426b191082ce342a006e8bcc81f916d272009d3563220f1183710fb76a98eca6bc90beb576920f5786b0e164d9f3c0d933aba704c8c952ced786aafc40d14cd73f787de030aa34e94a8284aeb0d032f9d9091a47d7165f65e1c3c646ad8c87d32032b91fa40133c6324c47f96c7b22ce0293e4a8daf33a537f98d1ad60a263d46db996247ff1258c45bf85c21702d579"}, 0x108, 0x44000}], 0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = socket$nl_xfrm(0x10, 0x3, 0x6) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = socket$inet_udp(0x2, 0x2, 0x0) close(r17) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r4, 0x0, r17, 0x0, 0x80000001, 0x0) [ 1654.512190] 2*512kB (ME) 2*1024kB (ME) 2*2048kB (UE) 0*4096kB = 11056kB [ 1654.512226] Node 0 DMA32: 2438*4kB (UMH) 561*8kB (UEH) 1532*16kB (UEH) 486*32kB (UEH) 4*64kB (H) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 54816kB [ 1654.512295] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1654.512401] Node 1 Normal: 2718*4kB (UME) 2792*8kB (UM) 1886*16kB (UM) 1573*32kB (UME) 952*64kB (UME) 463*128kB (UM) 187*256kB (UME) 49*512kB (UME) 8*1024kB (UME) 2*2048kB (UM) 804*4096kB (M) = 3612344kB [ 1654.512480] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1654.512487] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1654.512493] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1654.512499] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1654.512503] 125790 total pagecache pages [ 1654.512515] 0 pages in swap cache [ 1654.512519] Swap cache stats: add 0, delete 0, find 0/0 [ 1654.512523] Free swap = 0kB [ 1654.512526] Total swap = 0kB [ 1654.512533] 1965979 pages RAM [ 1654.512536] 0 pages HighMem/MovableOnly [ 1654.512540] 335233 pages reserved [ 1654.512543] 0 pages cma reserved [ 1654.722779] FAULT_INJECTION: forcing a failure. [ 1654.722779] name failslab, interval 1, probability 0, space 0, times 0 [ 1654.736695] selinux_nlmsg_perm: 39 callbacks suppressed [ 1654.736705] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1654.740807] CPU: 1 PID: 18450 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1654.750758] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=28915 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1654.753511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1654.753516] Call Trace: [ 1654.753535] dump_stack+0x142/0x197 [ 1654.753554] should_fail.cold+0x10f/0x159 [ 1654.758646] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1654.759817] should_failslab+0xdb/0x130 [ 1654.759827] kmem_cache_alloc+0x2d7/0x780 [ 1654.759842] ? lock_downgrade+0x740/0x740 [ 1654.768879] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1654.770376] alloc_vfsmnt+0x28/0x7d0 [ 1654.770388] vfs_kern_mount.part.0+0x2a/0x3d0 [ 1654.770400] do_mount+0x417/0x27d0 [ 1654.770410] ? retint_kernel+0x2d/0x2d 01:39:11 executing program 3 (fault-call:4 fault-nth:52): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1654.770422] ? copy_mount_string+0x40/0x40 [ 1654.770432] ? copy_mount_options+0x1a0/0x2f0 [ 1654.770442] ? copy_mount_options+0x1fe/0x2f0 [ 1654.775638] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1654.785505] SyS_mount+0xab/0x120 [ 1654.785514] ? copy_mnt_ns+0x8c0/0x8c0 [ 1654.785527] do_syscall_64+0x1e8/0x640 [ 1654.785535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1654.785550] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1654.785558] RIP: 0033:0x45d0ca [ 1654.785563] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1654.785574] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1654.785579] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1654.785584] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1654.785589] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1654.785594] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1654.819946] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1654.978316] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1655.005650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1655.041449] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1655.055001] FAULT_INJECTION: forcing a failure. [ 1655.055001] name failslab, interval 1, probability 0, space 0, times 0 [ 1655.061641] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18452 comm=syz-executor.5 [ 1655.106606] CPU: 0 PID: 18459 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1655.115093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1655.124470] Call Trace: [ 1655.127088] dump_stack+0x142/0x197 [ 1655.130746] should_fail.cold+0x10f/0x159 [ 1655.135079] should_failslab+0xdb/0x130 [ 1655.139188] __kmalloc_track_caller+0x2ec/0x790 [ 1655.143888] ? kstrdup_const+0x48/0x60 [ 1655.148437] kstrdup+0x3a/0x70 [ 1655.151850] kstrdup_const+0x48/0x60 [ 1655.155600] alloc_vfsmnt+0xe5/0x7d0 [ 1655.160146] vfs_kern_mount.part.0+0x2a/0x3d0 [ 1655.164761] do_mount+0x417/0x27d0 [ 1655.168321] ? copy_mount_options+0x5c/0x2f0 [ 1655.173006] ? rcu_read_lock_sched_held+0x110/0x130 [ 1655.173020] ? copy_mount_string+0x40/0x40 [ 1655.173032] ? copy_mount_options+0x1fe/0x2f0 [ 1655.183720] SyS_mount+0xab/0x120 [ 1655.183727] ? copy_mnt_ns+0x8c0/0x8c0 [ 1655.183738] do_syscall_64+0x1e8/0x640 [ 1655.183747] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1655.183763] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1655.183771] RIP: 0033:0x45d0ca [ 1655.183775] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1655.221787] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1655.229624] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1655.236896] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1655.246638] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1655.254936] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:12 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) 01:39:12 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:12 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) timerfd_create(0x5, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:39:12 executing program 3 (fault-call:4 fault-nth:53): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f0000000000)) [ 1656.414791] input: syz1 as /devices/virtual/input/input74 [ 1656.425546] FAULT_INJECTION: forcing a failure. [ 1656.425546] name failslab, interval 1, probability 0, space 0, times 0 [ 1656.476867] CPU: 1 PID: 18481 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1656.484895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1656.494989] Call Trace: [ 1656.495011] dump_stack+0x142/0x197 [ 1656.495027] should_fail.cold+0x10f/0x159 [ 1656.501318] should_failslab+0xdb/0x130 [ 1656.501330] __kmalloc_track_caller+0x2ec/0x790 [ 1656.501344] ? kstrdup_const+0x48/0x60 [ 1656.501354] kstrdup+0x3a/0x70 [ 1656.501362] kstrdup_const+0x48/0x60 [ 1656.501370] alloc_vfsmnt+0xe5/0x7d0 [ 1656.501381] vfs_kern_mount.part.0+0x2a/0x3d0 [ 1656.501393] do_mount+0x417/0x27d0 [ 1656.501401] ? copy_mount_options+0x5c/0x2f0 [ 1656.501411] ? rcu_read_lock_sched_held+0x110/0x130 [ 1656.501425] ? copy_mount_string+0x40/0x40 [ 1656.551576] ? copy_mount_options+0x1fe/0x2f0 [ 1656.556217] SyS_mount+0xab/0x120 [ 1656.559667] ? copy_mnt_ns+0x8c0/0x8c0 [ 1656.564783] do_syscall_64+0x1e8/0x640 [ 1656.569009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1656.574346] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1656.579866] RIP: 0033:0x45d0ca [ 1656.583051] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1656.591161] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1656.599607] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1656.606986] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1656.614707] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1656.622257] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:13 executing program 5: set_mempolicy(0x1029f9da60aae39d, &(0x7f0000000040)=0x4, 0x3ff) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1ff) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$rose(r4, &(0x7f00000000c0)="754020bfb2bdcdebbd86b4ea5c1cc01b152478925d29d33b21a515aab667934aed07d7d57e3857df4dd450aea6e9aab930baefe180f9510ac2e3a330a8ad9241f0173caad6f309dd13bd9581b994d14dc0d8635c95a2f517063046f924", 0x5d, 0x4, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) 01:39:13 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r1) 01:39:13 executing program 4 (fault-call:5 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:13 executing program 3 (fault-call:4 fault-nth:54): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1657.092791] input: syz1 as /devices/virtual/input/input75 [ 1657.114333] FAULT_INJECTION: forcing a failure. [ 1657.114333] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1657.157402] CPU: 0 PID: 18506 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1657.165529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1657.175037] Call Trace: [ 1657.177659] dump_stack+0x142/0x197 [ 1657.181309] should_fail.cold+0x10f/0x159 [ 1657.185559] ? __might_sleep+0x93/0xb0 [ 1657.189632] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1657.194305] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1657.199856] alloc_pages_current+0xec/0x1e0 [ 1657.204184] __get_free_pages+0xf/0x40 [ 1657.208068] get_zeroed_page+0x11/0x20 [ 1657.212128] mount_fs+0x1cc/0x2a1 [ 1657.215973] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1657.220476] do_mount+0x417/0x27d0 [ 1657.224220] ? copy_mount_options+0x5c/0x2f0 [ 1657.228637] ? rcu_read_lock_sched_held+0x110/0x130 [ 1657.233918] ? copy_mount_string+0x40/0x40 [ 1657.238346] ? copy_mount_options+0x1fe/0x2f0 [ 1657.242878] SyS_mount+0xab/0x120 [ 1657.246864] ? copy_mnt_ns+0x8c0/0x8c0 [ 1657.250769] do_syscall_64+0x1e8/0x640 [ 1657.254805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1657.259994] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1657.265530] RIP: 0033:0x45d0ca [ 1657.268722] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1657.277079] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1657.284790] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1657.292731] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 01:39:13 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) modify_ldt$read(0x0, &(0x7f0000000040)=""/94, 0x5e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:39:13 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r1) [ 1657.300802] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1657.308506] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:13 executing program 3 (fault-call:4 fault-nth:55): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:13 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r5, 0x5601, 0x0) dup2(r2, r1) 01:39:14 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6, 0x1) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000080)=0x6) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r6, 0x0, 0x80000001, 0x0) [ 1657.494633] input: syz1 as /devices/virtual/input/input76 [ 1657.516924] FAULT_INJECTION: forcing a failure. [ 1657.516924] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1657.561337] CPU: 1 PID: 18540 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1657.569359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1657.582212] Call Trace: [ 1657.584913] dump_stack+0x142/0x197 [ 1657.590652] should_fail.cold+0x10f/0x159 [ 1657.597880] ? __might_sleep+0x93/0xb0 [ 1657.604406] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1657.611067] ? check_preemption_disabled+0x3c/0x250 [ 1657.617115] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1657.624731] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1657.635216] ? __alloc_pages_nodemask+0x639/0x7a0 [ 1657.640860] alloc_pages_current+0xec/0x1e0 [ 1657.646040] __get_free_pages+0xf/0x40 [ 1657.650482] get_zeroed_page+0x11/0x20 [ 1657.654722] selinux_sb_copy_data+0x2a/0x390 [ 1657.661734] security_sb_copy_data+0x75/0xb0 [ 1657.666779] mount_fs+0x1ec/0x2a1 [ 1657.670345] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1657.677401] do_mount+0x417/0x27d0 [ 1657.682461] ? copy_mount_string+0x40/0x40 [ 1657.687861] ? copy_mount_options+0x18f/0x2f0 [ 1657.694275] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 1657.706475] ? copy_mount_options+0x1fe/0x2f0 [ 1657.714581] SyS_mount+0xab/0x120 [ 1657.721661] ? copy_mnt_ns+0x8c0/0x8c0 [ 1657.730235] do_syscall_64+0x1e8/0x640 [ 1657.735190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1657.740718] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1657.746771] RIP: 0033:0x45d0ca [ 1657.749964] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:39:14 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f00000000c0)={0xbd0c, 0x6, 0x8, 'queue0\x00', 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) socket$netlink(0x10, 0x3, 0x9) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r10 = getpid() ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000080)) sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = getpgrp(r10) kcmp(r9, r11, 0x4, 0xffffffffffffffff, r8) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r8, 0x0, 0x80000001, 0x0) [ 1657.758737] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1657.766296] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1657.776129] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1657.783684] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1657.792395] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:16 executing program 3 (fault-call:4 fault-nth:56): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1659.482129] FAULT_INJECTION: forcing a failure. [ 1659.482129] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.494243] CPU: 0 PID: 18564 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1659.502160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1659.512878] Call Trace: [ 1659.515472] dump_stack+0x142/0x197 [ 1659.521798] should_fail.cold+0x10f/0x159 [ 1659.526137] should_failslab+0xdb/0x130 [ 1659.530112] kmem_cache_alloc_trace+0x2e9/0x790 [ 1659.534993] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1659.540709] ? sget_userns+0xfe/0xc30 [ 1659.544590] ? rcu_read_lock_sched_held+0x110/0x130 [ 1659.549598] selinux_sb_alloc_security+0x46/0x220 [ 1659.557816] security_sb_alloc+0x6d/0xa0 [ 1659.563515] ? set_bdev_super+0x120/0x120 [ 1659.567646] sget_userns+0x196/0xc30 [ 1659.571896] ? ns_test_super+0x50/0x50 [ 1659.575778] ? ns_test_super+0x50/0x50 [ 1659.579745] ? set_bdev_super+0x120/0x120 [ 1659.584666] ? set_bdev_super+0x120/0x120 [ 1659.589157] ? ns_test_super+0x50/0x50 [ 1659.593038] sget+0xd6/0x120 [ 1659.596051] mount_bdev+0xd5/0x370 [ 1659.599637] ? hfsplus_iget+0x740/0x740 [ 1659.603655] hfsplus_mount+0x35/0x40 [ 1659.607359] mount_fs+0x97/0x2a1 [ 1659.611241] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1659.615750] do_mount+0x417/0x27d0 [ 1659.619287] ? copy_mount_options+0x5c/0x2f0 [ 1659.623855] ? rcu_read_lock_sched_held+0x110/0x130 [ 1659.628857] ? copy_mount_string+0x40/0x40 [ 1659.633086] ? copy_mount_options+0x1fe/0x2f0 [ 1659.637594] SyS_mount+0xab/0x120 [ 1659.642096] ? copy_mnt_ns+0x8c0/0x8c0 [ 1659.645978] do_syscall_64+0x1e8/0x640 [ 1659.649868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1659.654708] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1659.659901] RIP: 0033:0x45d0ca [ 1659.663088] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1659.670803] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1659.678078] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1659.685342] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1659.692685] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1659.699937] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:16 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/d\x02\x00input\x00', 0x800, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x2, r3, &(0x7f0000000000)="b423be4818fd08bfe128991a76695180303eb3fdaace7ef9e6ea47be1f360828f58bf7ce4c2771c22835a6796e85c05ed88660b672eed5f398eb93f42a42823e919f9500bf64b6dfabd08e4764856edefb0657c32f68598a907b7e619c43ab005597997890d72eecb35fd41645ec6c0f092e4d310c041b8c0d9cdec9fd12f6e27faebc7763b7c3be1ad36d693fb705a1d0c4ff6064e69c8ae85e391e47d68f240fd012d4a7a635561d6c393a558cf39bfae6391840", 0xb5, 0x200, 0x0, 0x0, r8}]) ioctl$UI_SET_MSCBIT(r5, 0x40045568, 0x3c) dup2(r2, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_RESUME(r14, 0x4147, 0x0) 01:39:16 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r1) 01:39:16 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 01:39:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VFIO_CHECK_EXTENSION(r6, 0x3b65, 0xa) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:16 executing program 3 (fault-call:4 fault-nth:57): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1660.157111] selinux_nlmsg_perm: 150 callbacks suppressed [ 1660.157121] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.159247] FAULT_INJECTION: forcing a failure. [ 1660.159247] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.203685] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.208194] CPU: 1 PID: 18582 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1660.224055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1660.233420] Call Trace: [ 1660.236032] dump_stack+0x142/0x197 [ 1660.239139] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.239667] should_fail.cold+0x10f/0x159 [ 1660.239685] should_failslab+0xdb/0x130 [ 1660.239697] kmem_cache_alloc_trace+0x2e9/0x790 [ 1660.256770] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.260031] ? lock_downgrade+0x740/0x740 [ 1660.260046] ? do_raw_spin_unlock+0x16b/0x260 [ 1660.260058] ? set_bdev_super+0x120/0x120 [ 1660.260067] sget_userns+0xfe/0xc30 [ 1660.260074] ? ns_test_super+0x50/0x50 [ 1660.260083] ? ns_test_super+0x50/0x50 [ 1660.260093] ? set_bdev_super+0x120/0x120 [ 1660.266549] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.276787] ? set_bdev_super+0x120/0x120 [ 1660.276797] ? ns_test_super+0x50/0x50 [ 1660.276807] sget+0xd6/0x120 [ 1660.276820] mount_bdev+0xd5/0x370 [ 1660.276830] ? hfsplus_iget+0x740/0x740 [ 1660.276842] hfsplus_mount+0x35/0x40 [ 1660.276853] mount_fs+0x97/0x2a1 01:39:16 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input\xafevent#\x00', 0x800, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r2, r1) 01:39:16 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)) dup2(0xffffffffffffffff, r1) [ 1660.282802] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.285481] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1660.285496] do_mount+0x417/0x27d0 [ 1660.285505] ? retint_kernel+0x2d/0x2d [ 1660.285517] ? copy_mount_string+0x40/0x40 [ 1660.291540] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.296334] ? __sanitizer_cov_trace_pc+0x29/0x60 [ 1660.296349] ? copy_mount_options+0x1fe/0x2f0 [ 1660.296361] SyS_mount+0xab/0x120 [ 1660.296370] ? copy_mnt_ns+0x8c0/0x8c0 01:39:17 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) r6 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r6, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1660.302085] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.304471] do_syscall_64+0x1e8/0x640 [ 1660.304482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1660.304498] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1660.304508] RIP: 0033:0x45d0ca [ 1660.310458] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.320681] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:39:17 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)) dup2(0xffffffffffffffff, r1) [ 1660.320692] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1660.320698] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1660.320704] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1660.320710] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1660.320716] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1660.373388] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18583 comm=syz-executor.5 [ 1660.502508] input: syz1 as /devices/virtual/input/input78 01:39:17 executing program 3 (fault-call:4 fault-nth:58): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x100, 0x3}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80040) write$P9_RREADDIR(r1, &(0x7f0000000180)={0x87, 0x29, 0x1, {0x3, [{{0x80, 0x0, 0x6}, 0x9, 0x40, 0x7, './file0'}, {{0x80, 0x3, 0x3}, 0x7, 0x9, 0x7, './file0'}, {{0x0, 0x0, 0x3}, 0xfffffffffffffff8, 0x9, 0x7, './file0'}, {{0x9d79a16f22ab92b8, 0x3, 0x2}, 0xc000000000000, 0x9, 0x7, './file0'}]}}, 0x87) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:39:17 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)) dup2(0xffffffffffffffff, r1) [ 1660.685543] input: syz1 as /devices/virtual/input/input80 [ 1660.693408] FAULT_INJECTION: forcing a failure. [ 1660.693408] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.718166] CPU: 1 PID: 18636 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1660.726088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1660.735446] Call Trace: [ 1660.738052] dump_stack+0x142/0x197 [ 1660.741698] should_fail.cold+0x10f/0x159 [ 1660.745863] should_failslab+0xdb/0x130 [ 1660.749850] kmem_cache_alloc_trace+0x2e9/0x790 [ 1660.754533] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1660.759991] ? sget_userns+0xfe/0xc30 [ 1660.763800] ? rcu_read_lock_sched_held+0x110/0x130 [ 1660.768840] selinux_sb_alloc_security+0x46/0x220 [ 1660.774218] security_sb_alloc+0x6d/0xa0 [ 1660.778303] ? set_bdev_super+0x120/0x120 [ 1660.782551] sget_userns+0x196/0xc30 [ 1660.786277] ? ns_test_super+0x50/0x50 [ 1660.790176] ? ns_test_super+0x50/0x50 [ 1660.794069] ? set_bdev_super+0x120/0x120 [ 1660.798233] ? set_bdev_super+0x120/0x120 [ 1660.802391] ? ns_test_super+0x50/0x50 [ 1660.806279] sget+0xd6/0x120 [ 1660.809455] mount_bdev+0xd5/0x370 [ 1660.812999] ? hfsplus_iget+0x740/0x740 [ 1660.817106] hfsplus_mount+0x35/0x40 [ 1660.820838] mount_fs+0x97/0x2a1 [ 1660.824212] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1660.828704] do_mount+0x417/0x27d0 [ 1660.832276] ? copy_mount_options+0x5c/0x2f0 [ 1660.836683] ? rcu_read_lock_sched_held+0x110/0x130 [ 1660.842963] ? copy_mount_string+0x40/0x40 [ 1660.847302] ? copy_mount_options+0x1fe/0x2f0 [ 1660.851806] SyS_mount+0xab/0x120 [ 1660.855275] ? copy_mnt_ns+0x8c0/0x8c0 [ 1660.859163] do_syscall_64+0x1e8/0x640 [ 1660.863048] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1660.867895] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1660.873236] RIP: 0033:0x45d0ca [ 1660.876412] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:39:17 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) [ 1660.884117] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1660.891386] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1660.900630] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1660.907891] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1660.915156] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:17 executing program 3 (fault-call:4 fault-nth:59): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1661.033141] FAULT_INJECTION: forcing a failure. [ 1661.033141] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.057846] input: syz1 as /devices/virtual/input/input81 [ 1661.066149] CPU: 1 PID: 18652 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1661.074068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1661.085857] Call Trace: [ 1661.088531] dump_stack+0x142/0x197 [ 1661.092194] should_fail.cold+0x10f/0x159 [ 1661.096362] should_failslab+0xdb/0x130 [ 1661.100342] __kmalloc+0x2f0/0x7a0 [ 1661.103900] ? __list_lru_init+0x6b/0x660 [ 1661.108149] __list_lru_init+0x6b/0x660 [ 1661.112190] sget_userns+0x4e0/0xc30 [ 1661.115895] ? ns_test_super+0x50/0x50 [ 1661.119785] ? set_bdev_super+0x120/0x120 [ 1661.123939] ? set_bdev_super+0x120/0x120 [ 1661.128069] ? ns_test_super+0x50/0x50 [ 1661.132050] sget+0xd6/0x120 [ 1661.135069] mount_bdev+0xd5/0x370 [ 1661.138594] ? hfsplus_iget+0x740/0x740 [ 1661.142564] hfsplus_mount+0x35/0x40 [ 1661.146317] mount_fs+0x97/0x2a1 [ 1661.149680] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1661.154174] do_mount+0x417/0x27d0 [ 1661.157719] ? copy_mount_options+0x5c/0x2f0 [ 1661.162297] ? rcu_read_lock_sched_held+0x110/0x130 [ 1661.167300] ? copy_mount_string+0x40/0x40 [ 1661.171671] ? copy_mount_options+0x1fe/0x2f0 [ 1661.176157] SyS_mount+0xab/0x120 [ 1661.179599] ? copy_mnt_ns+0x8c0/0x8c0 [ 1661.183540] do_syscall_64+0x1e8/0x640 [ 1661.187427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1661.192263] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1661.197517] RIP: 0033:0x45d0ca [ 1661.200692] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1661.208393] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1661.216097] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1661.223367] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1661.230632] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1661.238334] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:19 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) 01:39:19 executing program 3 (fault-call:4 fault-nth:60): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:19 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r8, 0x800443d3, &(0x7f0000000040)={{0x6, 0x9, 0x7, 0x4, 0x7, 0x6}, 0x3, 0x6, 0xffffffff}) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x105000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000100)={{{@in=@broadcast, @in=@empty}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000080)={0x200, 0x5, 0x8, 0x200, 0x7f}, 0x14) 01:39:19 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10001, 0x101000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x400) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r3, r2) 01:39:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) faccessat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=r10, @ANYBLOB="00000000000002002c001200080000200002000800090029000000140020ba114c49db88ed70fdac0c0300af3a9e69"], 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2117db2d47750000001100010000000000", @ANYRES32=r10], 0x2}}, 0x0) ioctl$sock_SIOCDELRT(r7, 0x890c, &(0x7f0000000000)={0x0, @vsock={0x28, 0x0, 0xffffffff, @hyper}, @sco={0x1f, {0x7, 0x2, 0x8, 0x8d, 0x6, 0x40}}, @hci={0x1f, r10, 0x2}, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x81, 0x7}) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r13) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5de2, 0x0, 0x4e20, 0x0, 0x6d71d069c203372c, 0x0, 0x40, 0x1d, r11, r13}, {0x9, 0x8, 0xfffffffffffffff7, 0x80000000, 0x5, 0xcb5b, 0x9, 0x1}, {0x0, 0x40, 0x7, 0xdeb}, 0x8, 0x6e6bb8, 0x1, 0x0, 0x2}, {{@in6=@empty, 0x4d2, 0x2b}, 0x2, @in=@broadcast, 0x3506, 0x0, 0x3, 0x34, 0x1, 0x1ff, 0x3}}, 0xe8) wait4(0x0, 0x0, 0x4, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r4, 0x0, 0x0) 01:39:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20}, 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={r5, 0xfffe}, 0x8) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:19 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) [ 1663.284407] input: syz1 as /devices/virtual/input/input82 [ 1663.308005] FAULT_INJECTION: forcing a failure. [ 1663.308005] name failslab, interval 1, probability 0, space 0, times 0 [ 1663.372549] CPU: 1 PID: 18673 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1663.380502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1663.389902] Call Trace: [ 1663.392516] dump_stack+0x142/0x197 [ 1663.396164] should_fail.cold+0x10f/0x159 [ 1663.400328] should_failslab+0xdb/0x130 [ 1663.404324] __kmalloc+0x2f0/0x7a0 [ 1663.407883] ? __list_lru_init+0x6b/0x660 [ 1663.413695] __list_lru_init+0x6b/0x660 [ 1663.417688] sget_userns+0x500/0xc30 [ 1663.421410] ? ns_test_super+0x50/0x50 [ 1663.425307] ? set_bdev_super+0x120/0x120 [ 1663.429459] ? set_bdev_super+0x120/0x120 [ 1663.433613] ? ns_test_super+0x50/0x50 [ 1663.437535] sget+0xd6/0x120 [ 1663.440567] mount_bdev+0xd5/0x370 [ 1663.444142] ? hfsplus_iget+0x740/0x740 [ 1663.448258] hfsplus_mount+0x35/0x40 [ 1663.451986] mount_fs+0x97/0x2a1 [ 1663.455481] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1663.460069] do_mount+0x417/0x27d0 [ 1663.463628] ? copy_mount_options+0x5c/0x2f0 [ 1663.468051] ? rcu_read_lock_sched_held+0x110/0x130 [ 1663.473071] ? copy_mount_string+0x40/0x40 [ 1663.477363] ? copy_mount_options+0x1fe/0x2f0 [ 1663.482338] SyS_mount+0xab/0x120 [ 1663.485800] ? copy_mnt_ns+0x8c0/0x8c0 [ 1663.489693] do_syscall_64+0x1e8/0x640 [ 1663.493588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1663.498450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1663.505123] RIP: 0033:0x45d0ca [ 1663.508570] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:39:20 executing program 5: pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_NOOP(r7, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f00000022c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="55ee0240"], 0x20}}, 0x0) r9 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r9, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r9, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r9, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000600)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r12 = socket$nl_route(0x10, 0x3, 0x0) splice(r11, 0x0, r12, 0x0, 0x1420000a77, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000300)={'team_slave_1\x00', @broadcast}) pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r13, &(0x7f0000000200)=""/250, 0x50c7e5e2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xb9d32d8a4a578077) ioctl$sock_inet6_SIOCSIFDSTADDR(r11, 0x8918, &(0x7f0000000580)={@loopback, 0x4e, r17}) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) getsockname$packet(r19, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r20, 0x0, 0x20000}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="af3acb58fc1dea95fd3234c06f11f417"}]}}}]}, 0x4c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xffffffffffffff82, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000940)=ANY=[@ANYBLOB="f3d1c77be42eab258c7dd47bc5ee0493ee4a132ea89e1d135b75275ba858f66de2db059e9685a055bbe67051c4e7f1540dc3fd04968c2b0296844046b3d94067f49db74fde0c8d0a3acc14ab179cdfe8ea7f4d62599a27e16b07140442f310360658f46c3b2d69cb6697c19aed30145ce315cb765ea09f927c6352d3cb25211bff7de3eeaffd635561257130854bafd9c3f29f71c4a386de00b13ae5f6f84dc183d71d2f571dba27acea21791f504f432a137519c18b5ff44c24c5f264d1ab831a5dccfb50289f87ffbf4c830c1864dddcfc8f3f603c5c4333d8d6691c4b2933db64f1d81b62156738cfa5d84eac7723", @ANYRESOCT], @ANYRES16=r8, @ANYRES16]}, 0x1, 0x0, 0x0, 0x20000}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r22 = socket$nl_route(0x10, 0x3, 0x0) splice(r21, 0x0, r22, 0x0, 0x1420000a77, 0x0) ioctl$SIOCSIFHWADDR(r21, 0x8924, &(0x7f0000000300)={'team_slave_1\x00', @broadcast}) pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r23, &(0x7f0000000200)=""/250, 0x50c7e5e2) getsockopt$inet6_IPV6_XFRM_POLICY(r23, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r21, 0x8918, &(0x7f0000000580)={@loopback, 0x4e, r24}) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)={0x14c, r8, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8, 0x1, r10}, {0x130, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x8020}, 0x2004a015) close(r5) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 01:39:20 executing program 1: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b505") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) [ 1663.517079] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1663.524359] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1663.531813] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 [ 1663.539096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1663.546403] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 01:39:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r5, 0x5601, 0x0) dup2(r2, r1) 01:39:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$rose(r3, &(0x7f0000000b40)=""/4096, 0x1000, 0x0, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @null}, 0x1c) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) fcntl$getflags(r4, 0x401) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r5 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) dup2(r6, r5) [ 1663.742648] input: syz1 as /devices/virtual/input/input84 [ 1663.835031] input: syz1 as /devices/virtual/input/input85 01:39:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) 01:39:22 executing program 3 (fault-call:4 fault-nth:61): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) 01:39:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000000c0)=0x7) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x373}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3fa", 0x10b}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000300)="2b3e7dc90ded7b4e7387578b0a1b42fbd30adce47f1b7fcc71c439a764f30ddaf802c661c65798a273d7fa929a0769b29f8fd2f8ddbfde9dfd6f809cd80f260a0e125c032b8cef088c7d6691d7e5f572756f7e7853306c9fce2385084e4a2f668b50d9cc1e1f8266507c7f5160d023797746270aea34a9e5ceda783d36140b41daedf473aec406e39a7a15d61be07a3015b34761aa28bb3f85df52c5e7e7665906798549b13560520a23309172104d5d802e6f63227a1a") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r6, 0xc058534f, &(0x7f0000000100)={{0x44, 0x46}, 0x1, 0xfffffff8, 0x7fffffff, {0x4, 0x82}, 0xdb, 0x8}) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000080)={0x1, 0x1, 0x7, 0x81, 0x200, 0x0, 0x2}) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r7, 0x0, 0x48a, &(0x7f0000000040)={0x2, 0x9ba, 0x20}, 0xc) 01:39:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r5, 0x5601, 0x0) dup2(r2, r1) 01:39:22 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r7, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x1b4, r8, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xc1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x14}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff8001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa0}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x14}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x95}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc58e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x20000000}, 0x44804) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, &(0x7f0000000040)={{0x2f, @dev={0xac, 0x14, 0x14, 0x1c}, 0x4e23, 0x4, 'dh\x00', 0x974c28f70b572180, 0x6, 0x6a}, {@remote, 0x4e24, 0x3, 0x8, 0x5888, 0x1}}, 0x44) pipe(&(0x7f0000000000)={0xffffffffffffffff}) dup2(r9, r1) 01:39:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @sco={0x1f, {0x8, 0x3, 0x0, 0x80, 0x9, 0x7}}, @xdp={0x2c, 0x0, 0x0, 0x33}, @ethernet={0x306, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x7ff, &(0x7f0000000040)='veth0_to_bond\x00', 0xffff, 0x7fff, 0x63d7}) pipe(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x11, 0x5, 0xac) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x993a0b8a39ce1511, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) ioctl$FS_IOC_ENABLE_VERITY(r9, 0x40806685, &(0x7f00000001c0)={0x1, 0x2, 0x1000, 0x4d, &(0x7f0000000140)="2cd2695caa5ba1a2f5fc78d1d9162888d905c817e72700265d0d536a8c3d4c72bd94e21c645b905ab6a6840e8d33829278ad8e4c6a4b085bb47ee801df3f07a64e95c8e37871ad04f7f69b7892", 0xe8, 0x0, &(0x7f0000000500)="2ff0bdd5a0fa8c23fc8313ce88bbdf088dcef03c899b819455e8262f988bcad8125bb61ccc3ba712692a4ec15cef0cb8e2b18d0c5f30ed1ecc1f0f0e294ddcbf8a7f76a98ba3c02f3f88e9fa7d5fc4a774124191745e8af83f400e34bc599a1145470f986d38f3f27b43d7865e66724f417f221646aa65bcb71ace36a08631214299a040aae5bc20e58acb3a6d759e29591bf1d6954b13401205d49a0eed7041d9daf9a10200b204c9046fe5a8d64cf4582df606834ffab97017cac17be54b3e5913274dc0cccb15918d4bf0dcc251528bc68650d4183d5bf7e25b2c8492daa444bfba34ba0c8c8b"}) r10 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r10, 0xc0505510, &(0x7f0000000480)={0x6, 0x32c24876619c1580, 0x1, 0x102, &(0x7f0000000040)}) r11 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(r12) socket$netlink(0x10, 0x3, 0x9) write$apparmor_current(r6, &(0x7f0000000400)=@hat={'changehat ', 0x1, 0x5e, ['wlan0proc\\:md5sum\x00', '\x00', '(system/\x00', '\x00', 'cgroup-vmnet0\'loprocvboxnet1md5sum:$:-\'\x00', '\x00', '{\x00', 'vboxnet1vboxnet0keyring!\x00', '\x00']}, 0x7f) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) sendto$inet(r12, &(0x7f0000000240)="350f06ca628937913d740444cca336f4e914f3a45027af1d6189a21aa75768df03fc580191fae09d85aa2ff4d482c715916d1294601391820d690c55a81f5cf42fcd5b02cd216639c099666076b07ad8337cf0d3faa16f3bab031295b885bf6315914c6cf3367f80fe0d8217ee19b9d869f40f5d21aef749df4589609e3115982163aafb51ea5cf331064fc19eb22f25f53a92ebc96c64e18d680403d103761c5beecf2b99d4f2615b057e40137dac8711bf598e778055cfc210cce70bdb01427063a90c9792d256c8080e05bd79a5d7177ee9dc496b92a3329b36fd3a", 0xdd, 0x40, &(0x7f0000000340)={0x2, 0x4e20, @multicast2}, 0x10) splice(r1, 0x0, r12, 0x0, 0x80000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$VT_OPENQRY(r15, 0x5600, &(0x7f0000000100)) [ 1666.345114] input: syz1 as /devices/virtual/input/input86 [ 1666.359637] input: syz1 as /devices/virtual/input/input87 [ 1666.416941] FAULT_INJECTION: forcing a failure. [ 1666.416941] name failslab, interval 1, probability 0, space 0, times 0 01:39:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz1\x00', 0x42}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r5, 0x5601, 0x0) dup2(r2, r1) [ 1666.468827] CPU: 1 PID: 18743 Comm: syz-executor.3 Not tainted 4.14.157-syzkaller #0 [ 1666.476774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.476781] Call Trace: [ 1666.476803] dump_stack+0x142/0x197 [ 1666.476828] should_fail.cold+0x10f/0x159 [ 1666.496565] should_failslab+0xdb/0x130 [ 1666.500554] __kmalloc+0x2f0/0x7a0 [ 1666.504139] ? __list_lru_init+0x6b/0x660 [ 1666.508304] __list_lru_init+0x6b/0x660 [ 1666.512300] sget_userns+0x4e0/0xc30 [ 1666.515967] selinux_nlmsg_perm: 22 callbacks suppressed [ 1666.515978] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=23466 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.516024] ? ns_test_super+0x50/0x50 [ 1666.538044] ? set_bdev_super+0x120/0x120 [ 1666.542207] ? set_bdev_super+0x120/0x120 [ 1666.542216] ? ns_test_super+0x50/0x50 [ 1666.542225] sget+0xd6/0x120 [ 1666.542237] mount_bdev+0xd5/0x370 [ 1666.542250] ? hfsplus_iget+0x740/0x740 [ 1666.542264] hfsplus_mount+0x35/0x40 [ 1666.542276] mount_fs+0x97/0x2a1 01:39:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x39) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000000)) close(r2) ptrace$cont(0x20, r5, 0x5, 0x0) [ 1666.542291] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1666.542303] do_mount+0x417/0x27d0 [ 1666.542311] ? copy_mount_options+0x5c/0x2f0 [ 1666.542324] ? rcu_read_lock_sched_held+0x110/0x130 [ 1666.542335] ? copy_mount_string+0x40/0x40 [ 1666.542347] ? copy_mount_options+0x1fe/0x2f0 [ 1666.542359] SyS_mount+0xab/0x120 [ 1666.559082] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.561395] ? copy_mnt_ns+0x8c0/0x8c0 [ 1666.561415] do_syscall_64+0x1e8/0x640 [ 1666.561424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1666.561441] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1666.561450] RIP: 0033:0x45d0ca [ 1666.561456] RSP: 002b:00007f6b5b4d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1666.561467] RAX: ffffffffffffffda RBX: 00007f6b5b4d5b40 RCX: 000000000045d0ca [ 1666.561473] RDX: 00007f6b5b4d5ae0 RSI: 0000000020000080 RDI: 00007f6b5b4d5b00 [ 1666.561478] RBP: 0000000000000000 R08: 00007f6b5b4d5b40 R09: 00007f6b5b4d5ae0 01:39:23 executing program 3 (fault-call:4 fault-nth:62): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@session={'session', 0x3d, 0x81020000}}]}) [ 1666.561482] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1666.561487] R13: 00000000004ca8c7 R14: 00000000004e3aa8 R15: 0000000000000005 [ 1666.744551] input: syz1 as /devices/virtual/input/input88 [ 1666.756970] ================================================================== [ 1666.764960] BUG: KASAN: use-after-free in kobject_put.cold+0x2e7/0x2f9 [ 1666.771654] Read of size 1 at addr ffff8880549fdd24 by task syz-executor.4/18740 [ 1666.779200] [ 1666.780846] CPU: 1 PID: 18740 Comm: syz-executor.4 Not tainted 4.14.157-syzkaller #0 [ 1666.788735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.791001] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.798083] Call Trace: [ 1666.798118] dump_stack+0x142/0x197 [ 1666.812606] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.812901] ? kobject_put.cold+0x2e7/0x2f9 [ 1666.817846] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.828542] print_address_description.cold+0x7c/0x1dc [ 1666.828554] ? kobject_put.cold+0x2e7/0x2f9 [ 1666.828561] kasan_report.cold+0xa9/0x2af [ 1666.828572] __asan_report_load1_noabort+0x14/0x20 [ 1666.828580] kobject_put.cold+0x2e7/0x2f9 [ 1666.828595] cdev_put.part.0+0x39/0x50 [ 1666.828603] cdev_put+0x20/0x30 [ 1666.828611] __fput+0x648/0x7a0 [ 1666.828624] ____fput+0x16/0x20 [ 1666.835135] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.846641] task_work_run+0x114/0x190 [ 1666.846658] exit_to_usermode_loop+0x1da/0x220 [ 1666.846669] do_syscall_64+0x4bc/0x640 [ 1666.846677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1666.846694] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1666.846701] RIP: 0033:0x45a679 [ 1666.846706] RSP: 002b:00007fd4f7e43c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 1666.846714] RAX: 0000000000000004 RBX: 0000000000000002 RCX: 000000000045a679 [ 1666.846719] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 000000000000000b [ 1666.846724] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1666.846728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4f7e446d4 [ 1666.846736] R13: 00000000004c0f40 R14: 00000000004d4aa8 R15: 00000000ffffffff [ 1666.856423] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.860485] [ 1666.860492] Allocated by task 18734: [ 1666.860507] save_stack_trace+0x16/0x20 [ 1666.860514] save_stack+0x45/0xd0 [ 1666.860521] kasan_kmalloc+0xce/0xf0 [ 1666.860529] kmem_cache_alloc_trace+0x152/0x790 [ 1666.860537] evdev_connect+0x76/0x4a0 [ 1666.860549] input_attach_handler+0x154/0x1a0 [ 1666.867040] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.869600] input_register_device.cold+0xbf/0x202 [ 1666.869611] uinput_ioctl_handler.isra.0+0xdc8/0x18a0 [ 1666.869620] uinput_ioctl+0x4a/0x60 [ 1666.875883] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.876779] do_vfs_ioctl+0x7ae/0x1060 [ 1666.876786] SyS_ioctl+0x8f/0xc0 [ 1666.876798] do_syscall_64+0x1e8/0x640 [ 1666.881569] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=18749 comm=syz-executor.5 [ 1666.883348] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1666.883351] [ 1666.883356] Freed by task 18765: [ 1666.883367] save_stack_trace+0x16/0x20 [ 1666.908844] kobject: 'loop3' (ffff8880a4086360): kobject_uevent_env [ 1666.912688] save_stack+0x45/0xd0 [ 1666.912698] kasan_slab_free+0x75/0xc0 [ 1666.912704] kfree+0xcc/0x270 [ 1666.912712] evdev_free+0x5e/0x70 [ 1666.912721] device_release+0x7b/0x1a0 [ 1666.912729] kobject_put.cold+0x269/0x2f9 [ 1666.912738] cdev_default_release+0x41/0x50 [ 1666.912744] kobject_put.cold+0x269/0x2f9 [ 1666.912752] cdev_put.part.0+0x39/0x50 [ 1666.912760] chrdev_open+0x266/0x590 [ 1666.912768] do_dentry_open+0x73b/0xeb0 [ 1666.912776] vfs_open+0x105/0x220 [ 1666.912784] path_openat+0x8bd/0x3f70 [ 1666.912790] do_filp_open+0x18e/0x250 [ 1666.912797] do_sys_open+0x2c5/0x430 [ 1666.912804] SyS_open+0x2d/0x40 [ 1666.912818] do_syscall_64+0x1e8/0x640 [ 1666.918834] kobject: 'loop3' (ffff8880a4086360): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1666.921179] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1666.921182] [ 1666.921190] The buggy address belongs to the object at ffff8880549fd740 [ 1666.921190] which belongs to the cache kmalloc-2048 of size 2048 [ 1666.921196] The buggy address is located 1508 bytes inside of [ 1666.921196] 2048-byte region [ffff8880549fd740, ffff8880549fdf40) [ 1666.921199] The buggy address belongs to the page: [ 1666.921206] page:ffffea0001527f00 count:1 mapcount:0 mapping:ffff8880549fc640 index:0x0 compound_mapcount: 0 [ 1666.921218] flags: 0xfffe0000008100(slab|head) [ 1666.921230] raw: 00fffe0000008100 ffff8880549fc640 0000000000000000 0000000100000003 [ 1666.921243] raw: ffffea000176e620 ffffea0002a71720 ffff8880aa800c40 0000000000000000 [ 1666.936549] hfsplus: session requires an argument [ 1666.943563] page dumped because: kasan: bad access detected [ 1666.943568] [ 1666.943571] Memory state around the buggy address: [ 1666.943579] ffff8880549fdc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1666.943585] ffff8880549fdc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1666.943591] >ffff8880549fdd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1666.943594] ^ [ 1666.943600] ffff8880549fdd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1666.943606] ffff8880549fde00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1666.943609] ================================================================== [ 1666.943612] Disabling lock debugging due to kernel taint [ 1666.952415] kobject: 'event4' (ffff888084718ff8): kobject_add_internal: parent: 'input88', set: 'devices' [ 1666.967242] hfsplus: unable to parse mount options [ 1666.978925] kobject: 'event4' (ffff888084718ff8): kobject_uevent_env [ 1666.979900] Kernel panic - not syncing: panic_on_warn set ... [ 1666.979900] [ 1666.983331] kobject: 'event4' (ffff888084718ff8): fill_kobj_path: path = '/devices/virtual/input/input88/event4' [ 1666.987101] CPU: 0 PID: 18740 Comm: syz-executor.4 Tainted: G B 4.14.157-syzkaller #0 [ 1666.987107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.987114] Call Trace: [ 1667.159188] kobject: 'event5' (ffff88805bef13f8): kobject_uevent_env [ 1667.161916] dump_stack+0x142/0x197 [ 1667.161927] ? kobject_put.cold+0x2e7/0x2f9 [ 1667.161935] panic+0x1f9/0x42d [ 1667.161942] ? add_taint.cold+0x16/0x16 [ 1667.161952] ? ___preempt_schedule+0x16/0x18 [ 1667.161965] kasan_end_report+0x47/0x4f [ 1667.167257] kobject: 'event5' (ffff88805bef13f8): fill_kobj_path: path = '/devices/virtual/input/input87/event5' [ 1667.168750] kasan_report.cold+0x130/0x2af [ 1667.168761] __asan_report_load1_noabort+0x14/0x20 [ 1667.168772] kobject_put.cold+0x2e7/0x2f9 [ 1667.183647] kobject: '(null)' (ffff88805bef1828): kobject_cleanup, parent ffff88805bef13f8 [ 1667.195896] cdev_put.part.0+0x39/0x50 [ 1667.195905] cdev_put+0x20/0x30 [ 1667.195911] __fput+0x648/0x7a0 [ 1667.195920] ____fput+0x16/0x20 [ 1667.195927] task_work_run+0x114/0x190 [ 1667.195941] exit_to_usermode_loop+0x1da/0x220 [ 1667.200952] kobject: '(null)' (ffff88805bef1828): calling ktype release [ 1667.210797] do_syscall_64+0x4bc/0x640 [ 1667.210805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1667.210818] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1667.210827] RIP: 0033:0x45a679 [ 1667.472042] RSP: 002b:00007fd4f7e43c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 1667.479743] RAX: 0000000000000004 RBX: 0000000000000002 RCX: 000000000045a679 [ 1667.487013] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 000000000000000b [ 1667.494270] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1667.501526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4f7e446d4 [ 1667.508792] R13: 00000000004c0f40 R14: 00000000004d4aa8 R15: 00000000ffffffff [ 1667.517472] Kernel Offset: disabled [ 1667.521098] Rebooting in 86400 seconds..