0x111}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x10000, 0x2, "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", 0x85, 0x0, 0x1, 0x4, 0xd9, 0x8}, r2}}, 0x128) r4 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r4, 0x0, 0x0) 15:13:05 executing program 5: socketpair(0x1, 0x5, 0x6c01, &(0x7f0000000640)) 15:13:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200140, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:05 executing program 1: socketpair(0x1, 0x5, 0x9701, &(0x7f0000000640)) 15:13:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x10000, 0x2, "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", 0x85, 0x0, 0x1, 0x4, 0xd9, 0x8}, r2}}, 0x128) read$char_raw(0xffffffffffffffff, 0x0, 0x0) 15:13:05 executing program 5: socketpair(0x1, 0x5, 0x6d00, &(0x7f0000000640)) 15:13:05 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) ioctl$IOCTL_VMCI_GET_CONTEXT_ID(0xffffffffffffffff, 0x7b3, &(0x7f0000000240)) select(0x40, &(0x7f0000000140)={0x8000, 0x80000000, 0x7, 0x5, 0x1d, 0x7, 0xfff, 0x3}, &(0x7f0000000180)={0x419d, 0x0, 0x1, 0x9, 0x0, 0x20, 0x8, 0xfff}, &(0x7f00000001c0)={0x1, 0x0, 0x9, 0x4, 0x800, 0x29f, 0x6, 0x2}, &(0x7f0000000200)={0x77359400}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x222400, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000100)={0x18, 0xfffffffffffffffe, 0x0, {0xfffffffc}}, 0x18) 15:13:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:05 executing program 1: socketpair(0x1, 0x5, 0x9800, &(0x7f0000000640)) 15:13:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket$pptp(0x18, 0x1, 0x2) 15:13:05 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) select(0x40, &(0x7f00000000c0)={0x7, 0x0, 0x40, 0x8, 0x3, 0x7, 0x538c, 0x36d}, &(0x7f0000000100)={0x7, 0x8dce, 0x7, 0xff, 0x8, 0x4, 0x1, 0x9}, &(0x7f0000000140)={0x7, 0x7f, 0x81, 0x4e53, 0x6, 0x401, 0x423b, 0x94}, &(0x7f0000000180)={0x0, 0xea60}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) select(0x40, &(0x7f00000001c0)={0xfffffffffffffffe, 0x7, 0x3, 0x9, 0x7fffffff, 0xe122, 0x8c, 0x8}, &(0x7f0000000200)={0x68, 0x6, 0x1f, 0x8000, 0x5, 0x0, 0x80000001, 0xe50}, &(0x7f0000000240)={0x1, 0x488000000000000, 0x28, 0x5, 0x4, 0x6, 0x5, 0x9b3abd1}, &(0x7f00000002c0)={r0, r1/1000+10000}) 15:13:05 executing program 5: socketpair(0x1, 0x5, 0x6d01, &(0x7f0000000640)) 15:13:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x10000, 0x2, "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", 0x85, 0x0, 0x1, 0x4, 0xd9, 0x8}, r2}}, 0x128) read$char_raw(0xffffffffffffffff, 0x0, 0x0) 15:13:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:05 executing program 1: socketpair(0x1, 0x5, 0x9801, &(0x7f0000000640)) 15:13:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x80000000}, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xe}}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0xa9c34a834d765fa2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000200)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$IOCTL_VMCI_GET_CONTEXT_ID(r4, 0x7b3, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1, {"86838d372014233580f78e7ba8002090"}, 0x8, 0x3, 0x7}}}, 0x90) 15:13:05 executing program 5: socketpair(0x1, 0x5, 0x6e00, &(0x7f0000000640)) 15:13:05 executing program 3: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, 0x1f}}, 0x18) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc}, &(0x7f0000000080)={0x6, 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000040)=0x77c) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000340)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) select(0x40, &(0x7f00000003c0)={0xfffffffffffffffc, 0x4, 0xff, 0x3ff, 0x100000000, 0x400000000, 0x4, 0xd92b}, &(0x7f0000000400)={0x40, 0x3, 0x1, 0xa5, 0x6, 0x3ff, 0x9, 0x1}, &(0x7f0000000440)={0x3, 0x82c0, 0x3, 0x0, 0x1, 0xffff, 0x81, 0xfff}, &(0x7f0000000480)={0x0, 0xea60}) 15:13:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x10000, 0x2, "bdbdb76827f8e696cc471d76083204fdf7b126a31dfcddfbbf33695d3a1cabe52f32f322b89ea743dc5e29512772ef048ab168cdd9237fc52ded85bb98127cad9cc5594cdd022f7b5c9cf408a191cf228e193ff4fd4333fd2197668ef64b02588ea2afe32574389cc75f95a5347ebb8f4666b07e73c9a05d6eb7b1b8cccc662de9c9d9b406c714456a4a8130462fc6b26f2fa1ff6cec222d017caf651c6880fe8720b91df758fa54a5cd49556ed4997af5f6558ce8b86cf2375d40f0f5637453796ab82b9dda69e1866fb27da3db34f19d48d34915d24d0ca06ab00f9e903c8bbc32d2b7912afdbc17c26b7e9b023315ab0415da6c7a578ffafcb46fe5a8a68c", 0x85, 0x0, 0x1, 0x4, 0xd9, 0x8}, r2}}, 0x128) read$char_raw(0xffffffffffffffff, 0x0, 0x0) 15:13:05 executing program 1: socketpair(0x1, 0x5, 0x9900, &(0x7f0000000640)) 15:13:05 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(0xffffffffffffffff, 0x7a8, &(0x7f0000000040)={{@host, 0x6}, @my=0x0, 0x6, 0x1, 0x9, 0x5, 0x1, 0x401}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @broadcast}, &(0x7f00000000c0)=0xc) 15:13:05 executing program 5: socketpair(0x1, 0x5, 0x6e01, &(0x7f0000000640)) [ 2898.826481] ieee802154 phy0 wpan0: encryption failed: -22 [ 2898.833544] ieee802154 phy1 wpan1: encryption failed: -22 15:13:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) r4 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r4, 0x0, 0x0) 15:13:05 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r1, 0x7b1, 0x0) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(r1, 0x7b2, &(0x7f0000000180)={&(0x7f0000000a40)=[0xab, 0x68, 0x1f, 0x3, 0x1, 0xfffff6c8, 0xfffffffe, 0x9, 0x2, 0xfffffffd, 0x5, 0x2, 0x1, 0x0, 0x65, 0x1ff, 0x7fffffff, 0x4, 0x0, 0xff, 0x6, 0x5, 0x2, 0x8, 0x7, 0x5, 0x0, 0x1d, 0x9, 0x400, 0x9, 0x8, 0x9172, 0x0, 0x7, 0x2e91eccd, 0x7, 0x401, 0x7ff, 0x1, 0xffffff00, 0x5f18, 0x3, 0x100, 0xb0, 0x1d8dd0f9, 0x24, 0x7, 0x876, 0x80000001, 0x893, 0x0, 0x8418, 0x3, 0x0, 0x3, 0x0, 0x401, 0x4, 0x401, 0x5, 0x3f, 0x1, 0x3d, 0x3, 0x6, 0x80000000, 0x2, 0x4, 0x0, 0x1, 0x10000, 0x1ff, 0x5, 0x2, 0x3, 0x3, 0x80000000, 0x800, 0x1, 0x5, 0x100, 0x101, 0x3ff, 0x400, 0xad, 0x2, 0x7, 0x1ff, 0x101, 0x7, 0x652, 0x5, 0x2b, 0x400, 0x429, 0x9, 0x20, 0x80, 0x6, 0x6, 0x5, 0x8, 0xffff, 0x3, 0x9, 0x101, 0x2f, 0xb9b, 0x2, 0x5, 0x9, 0x7, 0x8, 0xa1c, 0xd8c6, 0x0, 0xa04, 0x6, 0xbd, 0xc61e, 0x5, 0x9, 0x7, 0x4, 0xffff, 0x8, 0x0, 0x1, 0x6, 0x8, 0xfffffff9, 0x8, 0xe81d, 0x7fff, 0x7, 0x6, 0x5, 0x5ef, 0x2, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x100, 0x5, 0x2, 0x3, 0x1, 0x10000, 0xc3, 0x9, 0x8b, 0x5, 0x7ff, 0x7fffffff, 0x0, 0x1, 0x6, 0x2, 0x5, 0x101, 0x3, 0x4, 0x1000, 0x1814, 0x0, 0xf18, 0xc964, 0x4, 0x2b, 0x6, 0x7, 0x80, 0x4, 0x7fff, 0x4, 0x0, 0xa2c4, 0x1, 0x8, 0x10000, 0x10000000, 0x2, 0x5, 0xfff, 0x1, 0x0, 0x2, 0x7, 0x6, 0x0, 0x9, 0x2000400, 0x3, 0x50, 0x0, 0xef6d, 0x1, 0x7, 0x8, 0x400, 0x1, 0xffff, 0x0, 0x5233, 0x3, 0x4, 0x4, 0x200, 0x1, 0x10000, 0x3f, 0x0, 0x4, 0x7ff, 0x2, 0x3, 0x8, 0x9, 0x5, 0x1, 0x7b3, 0x6, 0x1, 0x2, 0x5, 0x4, 0x7fff, 0xaab, 0x79, 0x1, 0xff, 0xffffffc1, 0x0, 0x6, 0x400, 0x1, 0x861, 0xf8000000, 0xffffffff, 0x6, 0x8000, 0x4, 0xff, 0x0, 0x7, 0xff, 0x80000001, 0x800, 0x4ce, 0x81, 0x401, 0xc000, 0x9, 0x0, 0x81, 0x7fffffff, 0x6, 0x3, 0x3, 0x4, 0x1, 0x0, 0x401, 0x8, 0x20, 0xfffffffb, 0x101, 0x8000, 0x5, 0x80000000, 0x11a5927a, 0x1, 0x0, 0x7, 0x40, 0x8, 0x4, 0x2, 0x2, 0x40, 0xfffffca3, 0xc7, 0x9, 0x4, 0x3, 0x40000000, 0xffffffbc, 0x1, 0xca, 0xb589, 0x401, 0x7fff, 0x7c659f7d, 0x80000000, 0x5, 0x0, 0x200, 0x3, 0x80000000, 0x400, 0x40, 0x401, 0x80000001, 0x18a8e821, 0x6, 0x7, 0x21, 0x2, 0x1, 0x8, 0x7ff, 0x8, 0x1, 0x80000000, 0x8, 0x100, 0x6a, 0xd4, 0x33, 0x7f, 0xeb1f, 0xe9, 0x3, 0x3, 0x4f, 0x0, 0x6, 0x0, 0x8, 0xfb6, 0xfffffffc, 0x5, 0x8000, 0x1, 0x400, 0x6, 0x9, 0x9, 0x6e29, 0x7fff, 0x6, 0x40, 0x100, 0x6, 0x2c, 0x0, 0x605, 0x7, 0x10000, 0xffffffff, 0x1000, 0xad, 0x8, 0x3ff, 0x2, 0x579c, 0xb4a, 0x3, 0x1, 0x8, 0x1ca1, 0x4, 0x4, 0x2, 0x2, 0x4, 0x4, 0xce9, 0x0, 0x3fc, 0x4, 0x6, 0xff, 0x8, 0x9, 0x8, 0x0, 0x1, 0x3f, 0xb6, 0x7, 0x7, 0x5, 0xdc, 0x401, 0x2, 0x8000, 0x943, 0x3, 0x7, 0xea, 0x6, 0xffffffff, 0x1, 0x8, 0x1ff, 0x5, 0x9, 0x7, 0x7, 0xad4b, 0x7f, 0x8, 0x5, 0x200, 0xfffffffd, 0xfff, 0x8, 0x6, 0x2, 0x8000, 0x68f, 0x8, 0x7117e55c, 0x80, 0x1000, 0x7ff, 0x3ff, 0x5, 0x0, 0x7ff, 0x80, 0x13, 0x9, 0x9, 0x0, 0x8e8e, 0x101, 0x8, 0x40, 0x1f, 0xeb9, 0x4, 0x0, 0x1, 0x80000000, 0xffffffff, 0x5, 0x2, 0x9, 0x8, 0xfffffff8, 0x20, 0x1ff, 0x6, 0x5, 0xffff8001, 0x5, 0xdd, 0x7, 0xfff, 0x4, 0x7, 0x9, 0x1, 0x5, 0x81, 0x5ba, 0x8, 0xff, 0x10001, 0x3f, 0x4, 0x7ff, 0xffffff80, 0x0, 0x2, 0x2, 0x1, 0x3, 0x3, 0xffffffe1, 0x4, 0x4, 0x200, 0xe1, 0xffff71df, 0x3ff, 0x3, 0x2, 0x2, 0xffff, 0x0, 0x7, 0x7fff, 0x1, 0x5, 0x100, 0x0, 0x400, 0x8, 0x9, 0x1f, 0x9, 0x0, 0x4, 0x9e8, 0x80000000, 0x2, 0x0, 0x1, 0x3, 0x8000, 0x651, 0x9, 0x8000, 0x81, 0x0, 0x80000000, 0x401, 0x2, 0x8, 0x4, 0x5, 0x2, 0x4, 0x7, 0x6, 0x10001, 0x3, 0x3, 0x2, 0x1, 0x200, 0x7, 0x80000000, 0x1, 0x80, 0xfffffffe, 0x7e, 0x5, 0x3, 0x2, 0x1, 0x9, 0x9, 0x800, 0x3, 0x5, 0x83, 0x2, 0x7fffffff, 0x3, 0xa0, 0x800, 0x40, 0x0, 0x2, 0x0, 0xfffff142, 0x8, 0xfff, 0x38d94254, 0x6, 0x2dd9, 0x800, 0x8, 0x4, 0x9, 0x6, 0x100000, 0x6, 0x88e2, 0xfffffe00, 0x7f, 0x1f, 0xff, 0x5, 0x4, 0x8, 0x5, 0xfffffff9, 0x6, 0xfffffffb, 0xde63, 0x5, 0x6, 0x5, 0x401, 0x7fffffff, 0x4, 0x46, 0x8000, 0x39, 0x6, 0x9, 0x8, 0x1, 0x3, 0xffffffff, 0x4, 0x7fff, 0xffff718b, 0x8, 0x7, 0xd63, 0x7, 0x3, 0x1, 0x1, 0x2c04, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffa, 0x6, 0x1ff, 0xc329, 0x3ff, 0x7, 0x9, 0x10001, 0x40, 0x101, 0xf02a, 0x401, 0x3, 0x6b8, 0x200, 0x8, 0x7fffffff, 0xb13, 0x1, 0x6, 0x5, 0x10000, 0x5, 0x7ff, 0x4, 0x101, 0x8, 0x1, 0x9, 0x0, 0x40, 0x5, 0x9, 0x7f, 0x9, 0x6, 0x1000, 0x75, 0x3, 0x81, 0x1, 0x8, 0x7, 0x4, 0xfa1, 0x80, 0x7db, 0x1, 0x7, 0x6, 0x1, 0x8, 0x0, 0xffff, 0xfffff776, 0x4dfc868, 0x7fff, 0xa73, 0x9, 0x7, 0x6, 0x101, 0x6, 0x327e, 0xfffffff9, 0x1f, 0x8000, 0x0, 0xdd, 0x6e, 0x9, 0x8, 0x9, 0x3b5, 0x2, 0x2, 0x6, 0xfff, 0x7a, 0x80000001, 0x80, 0x3, 0x0, 0x7, 0x1000, 0x5, 0x4, 0x4, 0x540, 0xffffffff, 0x2, 0x4, 0x9, 0x1, 0x1, 0x9, 0x5, 0x5cf, 0x101, 0xaef, 0x7ff, 0x800, 0x141, 0xf8, 0x7fff, 0x3, 0x1ff, 0xfffffff8, 0x10001, 0x5, 0x7, 0x1, 0x6, 0x9, 0x2c52c1f6, 0x41, 0x1, 0x6, 0x7, 0xffffffff, 0x9, 0x8f, 0x3, 0x3, 0x5, 0x5, 0x9, 0x6, 0x0, 0x1ff, 0x1, 0x1, 0x8000, 0x9, 0xf82f, 0x400, 0x5, 0x5, 0x7, 0x6, 0x7fff, 0xffffffff, 0xfff, 0x1, 0x8001, 0x4, 0xffff, 0x800, 0x0, 0x1, 0xb0, 0x0, 0x7, 0x7fffffff, 0x7, 0x7f, 0x5aae898a, 0x8, 0x815, 0x2, 0x5, 0x2, 0xffffffff, 0x6, 0xfffffff7, 0x7fffffff, 0x0, 0x7, 0x3, 0x80000001, 0x7fffffff, 0x3ff, 0xf23, 0x7ff, 0x1, 0x5, 0x100, 0x9, 0xffffffff, 0x8, 0x40, 0x80000001, 0x3, 0x40, 0x3, 0x20, 0x1000, 0x0, 0x81, 0x8, 0x400, 0x1, 0xfff, 0x10001, 0xddb, 0x80000000, 0x8, 0x0, 0x1, 0x0, 0x5, 0xa1, 0xbc0000, 0x6, 0x8, 0xffffffc1, 0x0, 0x8, 0x5, 0x8, 0x81, 0x3, 0x645d6877, 0x4, 0x3, 0x3, 0x2, 0x7ff, 0x9, 0x40, 0xfc9a, 0x2702, 0x5fdc1368, 0x1, 0x3, 0x72, 0x10001, 0x2, 0x40, 0x4, 0x7, 0x0, 0x2, 0xe5, 0xcd, 0x43, 0x9, 0x8, 0x4e, 0x4, 0x54, 0x2, 0x4, 0x1, 0xc4e, 0x100, 0x8, 0x7f, 0x8, 0xfef9, 0x1000, 0x7fff, 0x8000, 0x1, 0x40, 0x22, 0x2, 0xac6, 0x7, 0xd18, 0x6, 0x2, 0x8, 0x101, 0x8, 0x1ff, 0x4, 0xff, 0x1000, 0xfffffff8, 0x3cf, 0x5, 0x1, 0x7, 0x80000001, 0x3, 0x2, 0x2, 0x100, 0x7, 0x64, 0x60, 0x46, 0x4ac, 0xfffffffc, 0x1f6, 0xd3, 0xc0, 0x10001, 0x8, 0x5800, 0xd9, 0x9, 0x400, 0x5, 0x7, 0x9, 0x254, 0x412a68de, 0xffff, 0x8, 0x9, 0x6, 0x8, 0xddf, 0xed95, 0xc8f2, 0x8, 0x9, 0x0, 0x1f, 0x7, 0x401, 0x9, 0x10000, 0xfd80, 0x490c, 0x7fff, 0x80, 0x1f, 0x6, 0x4, 0x3, 0xf6, 0x3, 0x0, 0x7f, 0x1, 0x3ff, 0xe1c, 0x401, 0x64f, 0x8000, 0x3, 0x9, 0x8, 0x3f, 0x0, 0xffffffff, 0x0, 0x0, 0xff, 0x0, 0x89b, 0x8, 0x3, 0x0, 0xacc0, 0x0, 0x0, 0x2, 0x5, 0x4, 0x5, 0x7, 0x8, 0x6a4a, 0x9, 0x858, 0x90c, 0x1000, 0x0, 0x100, 0x6, 0x7, 0x5, 0x40, 0x8f7, 0xd6f, 0x101, 0x51, 0xffff, 0x5, 0x2, 0x9, 0x87, 0x4, 0x179, 0x3, 0x0, 0x5, 0x5, 0x3f, 0x5, 0x5, 0x8000000, 0x5, 0x9, 0x10000, 0x4, 0x7, 0xffffffff, 0xaa, 0x10001, 0x8, 0x0, 0x1, 0x8, 0xa4af, 0x438ffb86, 0x1, 0x9, 0x3f, 0x8, 0x5, 0x3, 0x2, 0xf8de10f, 0xbda, 0x6, 0x3, 0xee, 0x9], 0x1, 0x400, 0x101, 0x3}) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r0, 0x7b1, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @dev, @dev}, &(0x7f0000000140)=0xc) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@any, 0x2}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) 15:13:05 executing program 1: socketpair(0x1, 0x5, 0x9901, &(0x7f0000000640)) 15:13:05 executing program 5: socketpair(0x1, 0x5, 0x6f00, &(0x7f0000000640)) 15:13:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x10000, 0x2, "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", 0x85, 0x0, 0x1, 0x4, 0xd9, 0x8}, r2}}, 0x128) r4 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r4, 0x0, 0x0) 15:13:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) r3 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r3, 0x0, 0x0) 15:13:05 executing program 1: socketpair(0x1, 0x5, 0x9a00, &(0x7f0000000640)) 15:13:05 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="b60000004f6f6cc3c6ba281f4fd2bfd456b3be8a9ba5ce3997a47d58609a0ae5c212e07e2423e924f7de2c73b572c54e362628c5ad2b316b21fdc07d191b89e4b9db37aa528ee820bf344643241274cc1923ed4e1c48fc19e579fff7000fe2a5f1ff4221cf08d8d5b6dd3cbe8633019071380c07f139a38a121e57260bdb55c67bb7f7c8f3c550852328a8337b034b14554def3ebbc75dbde2f401b4554fe5fc1567ed31872c5050bdfb1b4606c6cd946afa5d00000000000000"], &(0x7f0000000180)=0xbe) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000001c0)=""/125) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x566, 0x2, 0x4, 0xa14, 0x20}, &(0x7f0000000480)=0x98) 15:13:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 5: socketpair(0x1, 0x5, 0x6f01, &(0x7f0000000640)) 15:13:06 executing program 3: getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x80) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, &(0x7f0000000080)={0x6}, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) getsockname(r0, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x80) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0xffff, 0x0, 0x1}) select(0x40, &(0x7f00000002c0)={0x9, 0x2, 0x505c, 0xff, 0xfb, 0x7fffffff, 0xdd5, 0xffff}, &(0x7f0000000300)={0x200, 0x596, 0x0, 0x100000000, 0x9, 0x7fffffff, 0x3fbb, 0x5}, &(0x7f0000000340)={0x101, 0xffff, 0x5, 0x6, 0x0, 0x3, 0x1, 0x9}, &(0x7f0000000380)={0x77359400}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x0, r1}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000001c0)={0x0, 0x0, 0x10001}) 15:13:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x111}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r2, 0x0, 0x0) 15:13:06 executing program 1: socketpair(0x1, 0x5, 0x9a01, &(0x7f0000000640)) 15:13:06 executing program 5: socketpair(0x1, 0x5, 0x7000, &(0x7f0000000640)) 15:13:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000227bd7000fedbdf250100000008dc1a6c31be7c652e76c5eefc5c5e0003000000000014000100fe880000000000000000000000000001050005000500000005000500050000000800"], 0x50}, 0x1, 0x0, 0x0, 0x8040}, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) 15:13:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 1: socketpair(0x1, 0x5, 0x9b00, &(0x7f0000000640)) 15:13:06 executing program 5: socketpair(0x1, 0x5, 0x7001, &(0x7f0000000640)) 15:13:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x111}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r1, 0x0, 0x0) 15:13:06 executing program 1: socketpair(0x1, 0x5, 0x9b01, &(0x7f0000000640)) 15:13:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) select(0x40, &(0x7f0000000100)={0x7fff00000, 0x5, 0x6, 0x407, 0xff, 0x8, 0x5, 0x800}, &(0x7f0000000140)={0x81, 0x100, 0x100000000, 0x7, 0x6, 0x1, 0x9, 0x5}, &(0x7f0000000180)={0x5, 0xfffffffffffffc3a, 0xf3a8, 0x0, 0xda000000000, 0x7, 0x1, 0x577c}, &(0x7f00000001c0)) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000000c0)) 15:13:06 executing program 5: socketpair(0x1, 0x5, 0x7100, &(0x7f0000000640)) 15:13:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x111}}, 0x20) r1 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r1, 0x0, 0x0) 15:13:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 1: socketpair(0x1, 0x5, 0x9c00, &(0x7f0000000640)) 15:13:06 executing program 3: select(0x40, &(0x7f0000000000)={0x6f57, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8002}, &(0x7f0000000040)={0x4, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5}, &(0x7f0000000080)={0x6, 0x0, 0x3, 0x0, 0x0, 0x40000000000, 0x0, 0x1}, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='/dev/nvram\x00') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x1, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xffff, 0x7, {"39a2d28a387f8896f8c7bc74b5b33642"}, 0x6a5b, 0x7fffffff, 0x9}}}, 0xa0) 15:13:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 5: socketpair(0x1, 0x5, 0x7101, &(0x7f0000000640)) 15:13:06 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r0, 0x0, 0x0) 15:13:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 1: socketpair(0x1, 0x5, 0x9c01, &(0x7f0000000640)) 15:13:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:06 executing program 3: select(0x40, &(0x7f0000000000)={0x0, 0x7, 0x0, 0x7f}, &(0x7f0000000040)={0x1013, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x6}, &(0x7f0000000080)={0x8000000000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, 0x3, 0x8}, &(0x7f0000000100)={0x3, 0x100, 0x20, 0xffffffffffff15af, 0x757, 0x9, 0x7277, 0x3}, &(0x7f0000000140)={0x3, 0x10000, 0x6, 0xfffffffffffffffa, 0x8, 0x5, 0xffffffffffff295f, 0xaab}, &(0x7f00000001c0)={r0, r1/1000+60000}) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000200)={0x3f, 0x1}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) select(0x40, &(0x7f0000000240)={0x46d9452e, 0x4, 0x3, 0x8, 0x72f, 0x4, 0x100000001, 0xfffffffffffffff0}, &(0x7f0000000280)={0x6, 0x8, 0x35, 0x359, 0x401, 0x4521, 0x4175, 0x80000000}, &(0x7f00000002c0)={0xfffffffffffffffc, 0x8, 0x9, 0x3793, 0x18, 0xc470, 0xff, 0x401}, &(0x7f0000000340)={r2, r3/1000+60000}) clock_gettime(0x2, &(0x7f0000000400)) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) 15:13:06 executing program 5: socketpair(0x1, 0x5, 0x7200, &(0x7f0000000640)) 15:13:06 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r0, 0x0, 0x0) 15:13:06 executing program 1: socketpair(0x1, 0x5, 0x9d00, &(0x7f0000000640)) 15:13:06 executing program 5: socketpair(0x1, 0x5, 0x7201, &(0x7f0000000640)) 15:13:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:06 executing program 1: socketpair(0x1, 0x5, 0x9d01, &(0x7f0000000640)) 15:13:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:07 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f00000000c0)={{0x2, 0x3, 0x4, 0x2b3, 'syz1\x00', 0x8}, 0x1, [0x9, 0x3, 0x3, 0x72, 0x6, 0x2, 0x7, 0x101, 0x0, 0x800, 0xba, 0xa36c, 0x4, 0x2, 0x5, 0x800, 0x2000000000000000, 0x0, 0x7f, 0xffff, 0x2, 0x4, 0x80000001, 0xc1, 0x7, 0x101, 0x100, 0x8, 0x100000000, 0x8, 0x8001, 0x7b, 0x4, 0x6df, 0x4, 0x0, 0x7, 0x7, 0x2, 0x40, 0x3ff, 0x5eb00b2e, 0x7f, 0x5, 0xffffffff, 0x80000000, 0x8, 0x2, 0x7, 0x4, 0x18000, 0x0, 0x7f, 0x44011547, 0x400, 0x6, 0x6b813b4c, 0x80000001, 0x7, 0x2, 0x101, 0x5, 0x1, 0x81, 0x3cb3, 0x8, 0xc26, 0x1d, 0x100000000, 0x0, 0x100000001, 0xb9c7, 0x3b22, 0xfffffffffffffff7, 0x0, 0x200, 0x0, 0x5, 0x4, 0x1, 0x6, 0x3, 0x9, 0x54390c15, 0x68, 0x9, 0x9, 0x1000, 0x1, 0x4e, 0xac3e, 0x3, 0xffffffffffff0001, 0x0, 0x1000, 0x1, 0x0, 0x8, 0x0, 0x400, 0x1, 0xab, 0xb33c, 0x0, 0x9, 0x7, 0x9, 0x4af, 0xd24, 0xdb4b, 0xff, 0x10001, 0x0, 0x2, 0x1, 0x4, 0x2, 0xc9, 0x200, 0x200, 0x0, 0x0, 0x8, 0x8, 0x8000, 0xb8d, 0x5, 0xfff]}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f00000005c0)=0x6) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) 15:13:07 executing program 0: r0 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r0, 0x0, 0x0) 15:13:07 executing program 5: socketpair(0x1, 0x5, 0x7300, &(0x7f0000000640)) 15:13:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:07 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) sendmsg$inet_sctp(r0, &(0x7f0000001a00)={&(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x4}, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 15:13:07 executing program 1: socketpair(0x1, 0x5, 0x9e00, &(0x7f0000000640)) 15:13:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:07 executing program 5: socketpair(0x1, 0x5, 0x7301, &(0x7f0000000640)) 15:13:07 executing program 0: r0 = syz_open_dev$char_raw(0x0, 0x1, 0x0) read$char_raw(r0, 0x0, 0x0) 15:13:07 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000080)={0x6, 0x0, 0x1, 0x6, 0x0, 0xfffffffffffffffd}, 0x0) socket$packet(0x11, 0x0, 0x300) 15:13:07 executing program 1: socketpair(0x1, 0x5, 0x9e01, &(0x7f0000000640)) 15:13:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:07 executing program 5: socketpair(0x1, 0x5, 0x7400, &(0x7f0000000640)) 15:13:07 executing program 0: r0 = syz_open_dev$char_raw(0x0, 0x1, 0x0) read$char_raw(r0, 0x0, 0x0) 15:13:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:07 executing program 1: socketpair(0x1, 0x5, 0x9f00, &(0x7f0000000640)) 15:13:07 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) select(0x40, &(0x7f00000000c0)={0xbf1, 0x0, 0x1b90, 0x8001, 0x3e, 0xfff, 0x0, 0x100000001}, &(0x7f0000000100)={0x100000001, 0x1, 0x226, 0x0, 0x7, 0x8, 0x5, 0x101}, &(0x7f0000000140)={0x2f8, 0x402, 0x40b0, 0x0, 0x0, 0x6, 0x1, 0x9}, &(0x7f0000000180)) 15:13:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:07 executing program 0: r0 = syz_open_dev$char_raw(0x0, 0x1, 0x0) read$char_raw(r0, 0x0, 0x0) 15:13:07 executing program 5: socketpair(0x1, 0x5, 0x7401, &(0x7f0000000640)) 15:13:07 executing program 1: socketpair(0x1, 0x5, 0x9f01, &(0x7f0000000640)) 15:13:07 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) select(0x40, &(0x7f0000000100)={0x2, 0x8, 0x80, 0x80000001, 0x0, 0x5, 0x6352, 0x2}, &(0x7f0000000140)={0x200, 0x724, 0x3f, 0x7, 0x8992, 0x1, 0x11, 0x6}, &(0x7f0000000180)={0x4d, 0x6, 0x5, 0x4, 0x100000001, 0x9, 0x1b0c5759, 0x80000000}, &(0x7f0000000200)={r0, r1/1000+10000}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) 15:13:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:07 executing program 5: socketpair(0x1, 0x5, 0x7500, &(0x7f0000000640)) 15:13:07 executing program 0: syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(0xffffffffffffffff, 0x0, 0x0) 15:13:07 executing program 1: socketpair(0x1, 0x5, 0xa000, &(0x7f0000000640)) 15:13:07 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) select(0x40, &(0x7f0000000180)={0x6, 0x7, 0x401, 0x8001, 0x6, 0x7, 0x8, 0x5}, &(0x7f00000001c0)={0x1, 0x2, 0xffffffffffffffc0, 0x7, 0x10001, 0xe5, 0x81, 0x75b6}, &(0x7f0000000200)={0xffffffff, 0x9, 0x2, 0x0, 0x3ff, 0xffff, 0x100000000, 0x9}, &(0x7f0000000240)) getrusage(0x0, &(0x7f00000000c0)) 15:13:07 executing program 5: socketpair(0x1, 0x5, 0x7501, &(0x7f0000000640)) 15:13:07 executing program 0: syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(0xffffffffffffffff, 0x0, 0x0) 15:13:07 executing program 1: socketpair(0x1, 0x5, 0xa001, &(0x7f0000000640)) 15:13:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:07 executing program 0: syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(0xffffffffffffffff, 0x0, 0x0) 15:13:07 executing program 5: socketpair(0x1, 0x5, 0x7600, &(0x7f0000000640)) 15:13:07 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x200], 0x2, 0xc00, 0x0, 0xffffffffffffffff}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000180)={0x3ff, 0x2728212e, 0x80, 0xfffffffffffff24e, 0x3, 0x7}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x3, 0x7, 0xf0, 'syz0\x00', 0x4b}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000001c0)={0xa, 0x4, 0x0, 0xff, 'syz0\x00', 0x1}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) 15:13:07 executing program 1: socketpair(0x1, 0x5, 0xa100, &(0x7f0000000640)) 15:13:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:08 executing program 5: socketpair(0x1, 0x5, 0x7601, &(0x7f0000000640)) 15:13:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:08 executing program 1: socketpair(0x1, 0x5, 0xa101, &(0x7f0000000640)) 15:13:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:08 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x49b) select(0x40, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000080)={0x6, 0x0, 0xffffffff80000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) 15:13:08 executing program 5: socketpair(0x1, 0x5, 0x7700, &(0x7f0000000640)) 15:13:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:08 executing program 3: ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000000)={'hsr0\x00'}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0xa6000, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0x10001}}, 0x10) 15:13:08 executing program 1: socketpair(0x1, 0x5, 0xa200, &(0x7f0000000640)) 15:13:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:08 executing program 5: socketpair(0x1, 0x5, 0x7701, &(0x7f0000000640)) 15:13:08 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x20040, 0x0) ioctl$CHAR_RAW_FRASET(r1, 0x1264, &(0x7f0000000180)=0x4) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) 15:13:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:08 executing program 5: socketpair(0x1, 0x5, 0x7800, &(0x7f0000000640)) 15:13:08 executing program 3: ioctl$CHAR_RAW_ROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0b}, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x5, 0x7}, 0x0) select(0x40, &(0x7f00000000c0)={0xaa, 0x8, 0x100000001, 0x1ff, 0x3, 0xfffffffffffffff7, 0x2, 0x4}, &(0x7f0000000100)={0x3, 0x2, 0x3, 0xead, 0x1, 0x63, 0x1, 0x1}, &(0x7f0000000140)={0x6, 0x7544, 0x7, 0xb94c, 0x4, 0x7fffffff, 0x4, 0x8f0}, &(0x7f0000000180)) ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)=0x3) 15:13:08 executing program 1: socketpair(0x1, 0x5, 0xa201, &(0x7f0000000640)) 15:13:08 executing program 5: socketpair(0x1, 0x5, 0x7801, &(0x7f0000000640)) 15:13:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:08 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 15:13:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:08 executing program 1: socketpair(0x1, 0x5, 0xa300, &(0x7f0000000640)) 15:13:08 executing program 3: r0 = syz_open_dev$char_raw(&(0x7f0000000240)='/dev/raw/raw#\x00', 0x0, 0x54000) ioctl$CHAR_RAW_GETSIZE(r0, 0x1260, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) select(0x40, &(0x7f0000000100)={0x80000, 0x5, 0xfffffffffffffffd, 0x5, 0x7fffffff, 0x39, 0x8003, 0x8}, &(0x7f0000000140)={0x9, 0x7ada, 0xf1, 0x8001, 0xa39, 0x80, 0x7, 0x8}, &(0x7f0000000180)={0x9, 0x6, 0x9, 0x4, 0x5, 0x2, 0x10000000000, 0x3}, &(0x7f0000000200)={r1, r2/1000+10000}) 15:13:08 executing program 5: socketpair(0x1, 0x5, 0x7900, &(0x7f0000000640)) 15:13:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:08 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 15:13:08 executing program 1: socketpair(0x1, 0x5, 0xa301, &(0x7f0000000640)) 15:13:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:08 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xff, 0x1e48, 0x3}, &(0x7f0000000100)=0x10) 15:13:08 executing program 5: socketpair(0x1, 0x5, 0x7901, &(0x7f0000000640)) 15:13:08 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa400, &(0x7f0000000640)) 15:13:09 executing program 3: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x478d}, &(0x7f0000000080)={0x6, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x380, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000100)='!-([\x00') 15:13:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 5: socketpair(0x1, 0x5, 0x7a00, &(0x7f0000000640)) 15:13:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa401, &(0x7f0000000640)) 15:13:09 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f00000000c0)={0x6, 0xf9, 0x1}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r2, 0x7a6, &(0x7f00000002c0)={0x3f, 0x80, 0x814, 0x7ff, 0x1000, 0x6}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x1ff, @local, 0x6}, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0x17}, 0x6}, r3, 0x20}}, 0x48) 15:13:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa500, &(0x7f0000000640)) 15:13:09 executing program 5: socketpair(0x1, 0x5, 0x7a01, &(0x7f0000000640)) 15:13:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(0xffffffffffffffff, 0x7b2, &(0x7f00000010c0)={&(0x7f00000000c0)=[0x10000, 0x8000, 0x2, 0x2, 0x7, 0x7, 0x100, 0x2, 0x9, 0x9, 0xfd000000, 0x6e, 0x5, 0x40, 0x3, 0x9f, 0x7, 0x9, 0xef3dcc54, 0xf5, 0x4, 0x5, 0x1000, 0x3ff, 0x1, 0x0, 0x8001, 0x1000, 0xfffffff9, 0x6, 0x20, 0x5, 0x7f, 0x401, 0x4, 0x80000001, 0x3, 0x401, 0x3, 0x59, 0x10001, 0x8, 0x80000001, 0x0, 0x6, 0xb84, 0x345, 0x80, 0x4, 0x7a, 0x100, 0x8, 0x7, 0x7, 0x101, 0x8, 0xa632, 0xa57, 0x29b, 0xee, 0x59c, 0x7fff, 0x4, 0x9, 0x2, 0x1e, 0x8, 0xffffff81, 0xb, 0x7, 0x7, 0x40, 0x5, 0x40, 0xc7b5, 0xffffff9e, 0xa3, 0x7fffffff, 0x1, 0xffff, 0x7877, 0x20, 0x4, 0x20, 0xffffd741, 0x6, 0x6, 0x8, 0x7, 0x956f, 0x5, 0x5, 0x8, 0xeda, 0x9, 0x1, 0x7fffffff, 0x1200, 0x6, 0x2d0e, 0x7, 0x2, 0xff, 0x0, 0x3, 0x8, 0xc1ee, 0x4, 0x9, 0x9, 0x101, 0x2, 0x3, 0x638, 0xff, 0x5, 0x6, 0x1, 0x7, 0x7, 0x2000, 0xfffffff9, 0x9, 0xa4c, 0x2, 0xdc3, 0x1, 0x5, 0x1, 0x3fcdf237, 0x2, 0x8, 0x9, 0x3, 0x1290, 0x40, 0x7, 0x7, 0x5, 0xe67, 0x6, 0x100, 0x4, 0x3f, 0x3, 0x20, 0x3, 0x43f, 0x1, 0x7f, 0x2, 0x0, 0x0, 0x1, 0x3, 0x8, 0x10001, 0x5, 0x7, 0x7, 0x45, 0x7, 0x7fff, 0x6, 0x10000, 0x7, 0x4, 0x1, 0x3, 0x7, 0x1, 0x5, 0xffff, 0x9, 0x9, 0x40, 0x81, 0x4, 0x8000, 0x7, 0x100, 0x9, 0x200, 0x2, 0x3, 0x5, 0x1ff, 0xcf70, 0x7, 0x4, 0x2, 0x80, 0x1f, 0x5, 0x2, 0x101, 0x911, 0x8, 0xffff, 0xe2, 0xefe, 0x400, 0x8, 0x9, 0x0, 0x8001, 0x6, 0x1000, 0x0, 0x1, 0x7d99, 0x6, 0x5, 0x4, 0x6, 0x7fffffff, 0x4, 0x3, 0x9c30, 0x3, 0x1, 0x1, 0x81, 0x80000000, 0x400, 0x3ff, 0x7ff, 0x1, 0x66a, 0x0, 0xd6, 0x4, 0x6, 0x6, 0x0, 0x3, 0x80, 0x7, 0xfffffe00, 0x7f08, 0xdea, 0x9, 0xffffffff, 0x1, 0x1, 0x10000, 0xfffffffe, 0x1, 0x1ff, 0x7, 0x8, 0xb413, 0x80000001, 0x0, 0x0, 0x8a41, 0x3, 0x9, 0x60, 0x1, 0x3a7, 0x9, 0x6, 0x1, 0x1, 0x6, 0xf1, 0x8, 0x4, 0xff, 0x7fffffff, 0x7f, 0x80, 0x858, 0x7, 0x6, 0xf0000000, 0x1, 0x6, 0x1, 0x1, 0x8, 0x3, 0xfef, 0x8001, 0x8000, 0xffffffff, 0x22, 0x0, 0x1, 0x0, 0x3f, 0x1f, 0xffff, 0x1000, 0x6, 0x6, 0x40, 0x9, 0xe92, 0x3, 0x97, 0xfffffff9, 0xffffffff, 0x0, 0xffff7fff, 0x1, 0x800, 0x2, 0x396, 0x80000001, 0x1, 0x6, 0x8, 0x40, 0x1000, 0x4, 0x1, 0x9, 0x8f, 0x1290, 0x6, 0x8, 0xc2, 0xd5, 0x8, 0x0, 0x6, 0xfffffe9d, 0xf947, 0x1000, 0x3ff, 0x4, 0xf6, 0x26988, 0x8001, 0x7ff, 0x9, 0x101, 0xbe, 0x1, 0x9, 0xcca, 0xc89e, 0x7, 0x2, 0x7, 0x1, 0x7, 0x3, 0x80, 0x60000000, 0xaf, 0x4, 0xfc2, 0x8, 0x58, 0x100, 0x5, 0x9f5, 0x7, 0xffffffff, 0x8aa, 0xd28, 0x101, 0x6, 0xffffffff, 0x8, 0x1000, 0x8, 0x1f, 0x2, 0x2, 0x10, 0x5e89, 0x4, 0x8001, 0x800, 0x7, 0x100, 0x0, 0x98, 0x6, 0x3cc, 0x4, 0xfffffffa, 0xe40, 0x4ce5, 0x3, 0x6, 0x3, 0x200, 0x0, 0x5, 0x3, 0x8, 0xf932, 0x1, 0x7, 0x51, 0x7, 0x8001, 0x0, 0x2c, 0x7d000, 0x7fffffff, 0x0, 0x3e, 0x6, 0x0, 0x4, 0x8, 0x10000, 0xc0d, 0x9, 0x667, 0x7, 0x5, 0x2, 0xc1, 0x5e8e, 0x4, 0x7d, 0xfff, 0xfffff800, 0xffffff7f, 0x0, 0x7, 0x37, 0x9, 0x800, 0x7f6, 0x3f, 0x7e54, 0x0, 0x0, 0x7, 0x2, 0x9, 0x1, 0x0, 0x2040, 0x3, 0xfffffffc, 0x1ff, 0x8, 0x8, 0x2, 0x2, 0x2, 0x1, 0x3, 0x8394, 0xaeb, 0x10001, 0x2000, 0x6, 0x9, 0x2, 0x10001, 0x10000, 0x5, 0x8, 0x6, 0x8a, 0x0, 0x200, 0x1, 0xccd2, 0x7, 0xbc, 0x7, 0xfffffffb, 0x8, 0x6, 0x7da, 0x8, 0x8, 0x800000, 0x848, 0xffff, 0x10000, 0x7ff, 0x0, 0x3, 0x0, 0x4, 0x3ff, 0x4, 0x8, 0x7, 0xbd9, 0x237d9097, 0x7000000, 0x0, 0x9, 0x1, 0x3, 0x9, 0x3, 0x5, 0x7, 0x9, 0x7, 0x5, 0x1, 0x10000, 0x200, 0x0, 0xa37c, 0xffffffff, 0x8b, 0x70c, 0x2, 0x7f, 0x4, 0x7, 0xb077, 0xffffffff, 0x7f, 0x9, 0x2, 0x6, 0x800, 0x6, 0x0, 0x1, 0x688, 0x5, 0x3f, 0x334, 0x100, 0x0, 0x8, 0x8, 0x6, 0x4, 0x3, 0x2, 0x9, 0x4, 0xfffffff9, 0x400, 0xffffff01, 0x6, 0xc90, 0x3, 0x4, 0x7, 0x7fff, 0x3, 0x3, 0x28, 0x5, 0x1, 0x7fffffff, 0x4, 0x35a9, 0xffffffc0, 0xfff, 0x0, 0x10001, 0xffffff7f, 0xfffffffd, 0x8001, 0x8, 0x4, 0x24a, 0x2, 0x6, 0x1ff, 0x3ff, 0x6, 0x2, 0x8, 0x7, 0x200, 0x6, 0x81, 0x3, 0xcbe, 0x3f, 0x100, 0x200, 0x8000, 0x33, 0x7fff, 0x0, 0x6, 0x200, 0x7, 0x7, 0x58d, 0x400, 0x4, 0x0, 0x800, 0x8, 0x9, 0x0, 0x8000, 0xfffffff8, 0xfffffb31, 0x2, 0x9, 0xffffffff, 0x80000000, 0x8, 0x6, 0x7f, 0x9, 0x8, 0x100, 0x10, 0x9, 0x5, 0xd7, 0x80000000, 0xfffffffe, 0x9, 0x0, 0x8, 0x8001, 0xffffffff, 0x4000000, 0x1, 0x40, 0xf93, 0x2, 0x5, 0xcdaf, 0x0, 0xff, 0x9, 0x5, 0x8, 0x4, 0x7fffffff, 0x1000, 0xa7, 0x4, 0x2, 0x2, 0x9, 0xfffff56d, 0x7, 0x43, 0x800, 0x1, 0x1f, 0x4, 0x3, 0x1, 0x6, 0x8000, 0x5, 0x8, 0x0, 0x0, 0x1, 0x88b, 0x8, 0x40, 0x3f, 0x1f, 0x4, 0xfff, 0x3, 0xd83d, 0x101, 0x1000, 0x7f6, 0xef5c, 0x0, 0x4ed2, 0x7, 0x9, 0x1000, 0x8, 0x800, 0x1f8, 0x2, 0x3, 0x6, 0x5, 0x80000001, 0x9, 0x1f, 0x7, 0x9, 0x5, 0x10000, 0x80000000, 0x1, 0x40, 0x400, 0x3, 0x3, 0x401, 0x8001, 0xd4, 0x1, 0x5, 0x7, 0x7605, 0x9f, 0x80000001, 0x2, 0x6bf1, 0x8000, 0xffffffff, 0x6, 0x35, 0x2996, 0x80000001, 0x7ff, 0x0, 0x3, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0xfff, 0x5, 0x7ff, 0x14e, 0xd7b2, 0x8, 0x4, 0x400, 0x20, 0x6, 0xee5c, 0x3f000, 0x9, 0x0, 0x135a, 0x4, 0xfffffff7, 0x9, 0x8001, 0x1, 0x7, 0xfff, 0x400, 0x10000, 0xffffba57, 0xffff4c89, 0x1ff, 0xffffffff, 0x7a2, 0x1ff, 0x7ff, 0xffff, 0x244, 0x0, 0x8, 0x1, 0x6, 0xffffffff, 0x2, 0xa02, 0x5, 0x80, 0x2, 0x4, 0x3f, 0xffff, 0xa0, 0xd978, 0x7ff, 0x2021d99f, 0x2, 0xffff, 0x8, 0x5, 0x7ff, 0x4, 0x27, 0x5, 0x3, 0x5, 0x4, 0x37, 0x7f, 0x10001, 0x6, 0x6, 0xfffff8ab, 0x4, 0x2, 0x1f, 0x697, 0xc3, 0x8000000, 0xfff, 0x7fffffff, 0xff, 0xc837, 0x8, 0x5, 0xe4f, 0xb275, 0x86c8, 0x1, 0xfffff36c, 0xc5, 0x3, 0x1, 0x2, 0x2, 0x5e41, 0x6, 0x9, 0x1, 0x8, 0x100, 0x3, 0x78, 0xffff, 0x7, 0xffffff80, 0x1, 0x100, 0xc, 0x7, 0x0, 0x9, 0x2, 0x9, 0xa39, 0x7, 0x7, 0x3f, 0x101, 0x0, 0x0, 0x4, 0x0, 0x4, 0x3, 0x101, 0x6, 0x7, 0x6f, 0x80, 0x800, 0xa3, 0x81, 0x3, 0x3f, 0x3f00000, 0x74, 0x4, 0x1, 0x6, 0x81, 0xca9, 0x375, 0x6, 0xff, 0x100, 0x8, 0x7fff, 0xff, 0x0, 0x7fff, 0x7fffffff, 0x3f, 0xff, 0x7fffffff, 0x8, 0x4, 0xfff, 0x6, 0x9, 0x6, 0x38, 0x5, 0x0, 0x4, 0x0, 0x1a, 0x85, 0x6, 0x2, 0x3, 0x8, 0xcd5a, 0x3ff, 0x6, 0x3, 0x3, 0x3, 0x2f, 0xffffffc0, 0x9, 0xfffeffff, 0x2, 0x7, 0xc0000000, 0x3, 0x7, 0xefb, 0x1, 0x5, 0x5, 0x7, 0xa9f, 0x9, 0xc5, 0x4b31, 0x4, 0x4, 0x3, 0x9, 0x81, 0x1, 0x6c, 0x1, 0x0, 0x5, 0x4, 0x2, 0x40, 0x0, 0x8, 0x9, 0x9, 0x0, 0xfff, 0x1, 0x8, 0x9dfe, 0x8001, 0x1000, 0x0, 0x4, 0xfffffffb, 0x401, 0x9, 0x2, 0x200, 0x28, 0x3, 0x73a, 0x1, 0xc94b, 0x8, 0x19fa, 0x9, 0x2, 0x10001, 0xffffffff, 0x3, 0x7, 0x4, 0x7, 0x7, 0x0, 0x7, 0x5, 0xffffffff, 0x8, 0x8, 0x4, 0x1000, 0x6, 0x7414, 0x1, 0x7, 0x40000, 0x0, 0xd6, 0x1f, 0x800, 0xfff, 0x93, 0xfffffff7, 0x100, 0x2, 0x0, 0x0, 0x20000000, 0xc3d5, 0xffff, 0x7fff, 0x800, 0x2, 0x1, 0x10000000, 0x5, 0x2, 0x400, 0x5, 0x4, 0x48, 0x3f, 0xc82, 0x8000, 0x2, 0x7f, 0x4f, 0x2, 0x5, 0x100, 0x8000, 0x3, 0x2, 0x1, 0x1ff, 0xffffffff, 0x9ac, 0x8, 0x1, 0x1, 0x7, 0x3b66, 0x3, 0x7, 0x100000, 0x68, 0x2], 0x2, 0x400, 0xb29, 0xfffffffd}) 15:13:09 executing program 5: socketpair(0x1, 0x5, 0x7b00, &(0x7f0000000640)) 15:13:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa501, &(0x7f0000000640)) 15:13:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 3: select(0x40, &(0x7f00000000c0)={0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4, 0x4}, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x2000000004}, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) select(0x40, &(0x7f0000000080)={0x8001, 0x8, 0x0, 0x3, 0x9, 0x4, 0x100000000, 0x8}, &(0x7f0000000100)={0x2be, 0x6, 0x0, 0x9, 0x200, 0x2, 0x3d, 0x8000}, &(0x7f0000000140)={0x10000, 0x0, 0x6, 0x100000001, 0x1, 0x0, 0x7f8000000000}, &(0x7f0000000180)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000001c0)={@dev}, &(0x7f0000000200)=0x14) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) select(0x40, &(0x7f0000000240)={0xfffffffffffffffd, 0x0, 0x5, 0x4, 0x8, 0x2, 0x7fff, 0x80}, &(0x7f0000000280)={0x100000001, 0x4a838dc4, 0x2, 0x3ef, 0x9, 0x57, 0x3}, &(0x7f00000002c0)={0x6, 0x7, 0x1, 0x2, 0xffffffffffffffe1, 0x2, 0x101, 0xe5d}, &(0x7f0000000340)={r0, r1/1000+10000}) 15:13:09 executing program 5: socketpair(0x1, 0x5, 0x7b01, &(0x7f0000000640)) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa600, &(0x7f0000000640)) 15:13:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 3: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa601, &(0x7f0000000640)) 15:13:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 5: socketpair(0x1, 0x5, 0x7c00, &(0x7f0000000640)) 15:13:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x7, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x101}, &(0x7f0000000040)=0x8) getsockname(r2, &(0x7f00000000c0)=@rc={0x1f, @fixed}, &(0x7f0000000080)=0x80) getsockname(r2, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000280)=0x80) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000002c0)={'bridge0\x00'}) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa700, &(0x7f0000000640)) 15:13:09 executing program 5: socketpair(0x1, 0x5, 0x7c01, &(0x7f0000000640)) 15:13:09 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x81}, &(0x7f0000000080)={0x6}, 0x0) 15:13:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:09 executing program 1: socketpair(0x1, 0x5, 0xa701, &(0x7f0000000640)) 15:13:09 executing program 5: socketpair(0x1, 0x5, 0x7d00, &(0x7f0000000640)) 15:13:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:10 executing program 1: socketpair(0x1, 0x5, 0xa800, &(0x7f0000000640)) 15:13:10 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x7, 0x7fff, 0x0], 0x3, 0x800, 0x0, 0xffffffffffffffff}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000340)={{@local, 0x8}, @any, 0x9, 0x10000, 0x3, 0x6, 0x8, 0x3b400}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x8337, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={r1, 0x7, 0xa45b, 0x9}, &(0x7f0000000280)=0x10) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) select(0x40, &(0x7f00000000c0)={0x3, 0x4, 0xffffffffffffffa1, 0x10000000000007, 0x425, 0x67, 0x10000, 0xfffffffffffffff9}, &(0x7f0000000100)={0x80000001, 0x80000001, 0xeb6, 0x9, 0x8, 0x7, 0x4, 0x40}, &(0x7f0000000140)={0x5, 0x0, 0xe3f, 0x8000000000004, 0x2, 0x1a78, 0x80000001, 0x4}, &(0x7f0000000180)={0x77359400}) 15:13:10 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:10 executing program 1: socketpair(0x1, 0x5, 0xa801, &(0x7f0000000640)) 15:13:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 5: socketpair(0x1, 0x5, 0x7d01, &(0x7f0000000640)) 15:13:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:10 executing program 1: socketpair(0x1, 0x5, 0xa900, &(0x7f0000000640)) 15:13:10 executing program 5: socketpair(0x1, 0x5, 0x7e00, &(0x7f0000000640)) 15:13:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:10 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:10 executing program 5: socketpair(0x1, 0x5, 0x7e01, &(0x7f0000000640)) 15:13:10 executing program 1: socketpair(0x1, 0x5, 0xa901, &(0x7f0000000640)) 15:13:10 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 5: socketpair(0x1, 0x5, 0x7f00, &(0x7f0000000640)) 15:13:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 1: socketpair(0x1, 0x5, 0xaa00, &(0x7f0000000640)) 15:13:10 executing program 5: socketpair(0x1, 0x5, 0x7f01, &(0x7f0000000640)) 15:13:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:10 executing program 1: socketpair(0x1, 0x5, 0xaa01, &(0x7f0000000640)) 15:13:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:10 executing program 5: socketpair(0x1, 0x5, 0x8100, &(0x7f0000000640)) 15:13:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 1: socketpair(0x1, 0x5, 0xab00, &(0x7f0000000640)) 15:13:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:10 executing program 5: socketpair(0x1, 0x5, 0x8101, &(0x7f0000000640)) 15:13:11 executing program 1: socketpair(0x1, 0x5, 0xab01, &(0x7f0000000640)) 15:13:11 executing program 1: socketpair(0x1, 0x5, 0xac00, &(0x7f0000000640)) 15:13:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 5: socketpair(0x1, 0x5, 0x8200, &(0x7f0000000640)) 15:13:11 executing program 1: socketpair(0x1, 0x5, 0xac01, &(0x7f0000000640)) 15:13:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 5: socketpair(0x1, 0x5, 0x8201, &(0x7f0000000640)) 15:13:11 executing program 1: socketpair(0x1, 0x5, 0xad00, &(0x7f0000000640)) 15:13:11 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:11 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 1: socketpair(0x1, 0x5, 0xad01, &(0x7f0000000640)) 15:13:11 executing program 5: socketpair(0x1, 0x5, 0x8300, &(0x7f0000000640)) 15:13:11 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 1: socketpair(0x1, 0x5, 0xae00, &(0x7f0000000640)) 15:13:11 executing program 5: socketpair(0x1, 0x5, 0x8301, &(0x7f0000000640)) 15:13:11 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:11 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 1: socketpair(0x1, 0x5, 0xae01, &(0x7f0000000640)) 15:13:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 5: socketpair(0x1, 0x5, 0x8400, &(0x7f0000000640)) 15:13:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:11 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8401, &(0x7f0000000640)) 15:13:12 executing program 1: socketpair(0x1, 0x5, 0xaf00, &(0x7f0000000640)) 15:13:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8500, &(0x7f0000000640)) 15:13:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 1: socketpair(0x1, 0x5, 0xaf01, &(0x7f0000000640)) 15:13:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8501, &(0x7f0000000640)) 15:13:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 1: socketpair(0x1, 0x5, 0xb000, &(0x7f0000000640)) 15:13:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 15:13:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8600, &(0x7f0000000640)) 15:13:12 executing program 1: socketpair(0x1, 0x5, 0xb001, &(0x7f0000000640)) 15:13:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 15:13:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8601, &(0x7f0000000640)) 15:13:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 1: socketpair(0x1, 0x5, 0xb100, &(0x7f0000000640)) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8700, &(0x7f0000000640)) 15:13:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:12 executing program 1: socketpair(0x1, 0x5, 0xb101, &(0x7f0000000640)) 15:13:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8701, &(0x7f0000000640)) 15:13:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:12 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:12 executing program 5: socketpair(0x1, 0x5, 0x8800, &(0x7f0000000640)) 15:13:12 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb200, &(0x7f0000000640)) 15:13:13 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 5: socketpair(0x1, 0x5, 0x8801, &(0x7f0000000640)) 15:13:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb201, &(0x7f0000000640)) 15:13:13 executing program 5: socketpair(0x1, 0x5, 0x8900, &(0x7f0000000640)) 15:13:13 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb300, &(0x7f0000000640)) 15:13:13 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 5: socketpair(0x1, 0x5, 0x8901, &(0x7f0000000640)) 15:13:13 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb301, &(0x7f0000000640)) 15:13:13 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 5: socketpair(0x1, 0x5, 0x8a00, &(0x7f0000000640)) 15:13:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb400, &(0x7f0000000640)) 15:13:13 executing program 0: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 5: socketpair(0x1, 0x5, 0x8a01, &(0x7f0000000640)) 15:13:13 executing program 0: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb401, &(0x7f0000000640)) 15:13:13 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 5: socketpair(0x1, 0x5, 0x8b00, &(0x7f0000000640)) 15:13:13 executing program 0: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb500, &(0x7f0000000640)) 15:13:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:13 executing program 5: socketpair(0x1, 0x5, 0x8b01, &(0x7f0000000640)) 15:13:13 executing program 1: socketpair(0x1, 0x5, 0xb501, &(0x7f0000000640)) 15:13:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 5: socketpair(0x1, 0x5, 0x8c00, &(0x7f0000000640)) 15:13:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 1: socketpair(0x1, 0x5, 0xb600, &(0x7f0000000640)) 15:13:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 5: socketpair(0x1, 0x5, 0x8c01, &(0x7f0000000640)) 15:13:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 1: socketpair(0x1, 0x5, 0xb601, &(0x7f0000000640)) 15:13:14 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 5: socketpair(0x1, 0x5, 0x8d00, &(0x7f0000000640)) 15:13:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 1: socketpair(0x1, 0x5, 0xb700, &(0x7f0000000640)) 15:13:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 5: socketpair(0x1, 0x5, 0x8d01, &(0x7f0000000640)) 15:13:14 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 1: socketpair(0x1, 0x5, 0xb701, &(0x7f0000000640)) 15:13:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 5: socketpair(0x1, 0x5, 0x8e00, &(0x7f0000000640)) 15:13:14 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 1: socketpair(0x1, 0x5, 0xb800, &(0x7f0000000640)) 15:13:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 5: socketpair(0x1, 0x5, 0x8e01, &(0x7f0000000640)) 15:13:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:14 executing program 1: socketpair(0x1, 0x5, 0xb801, &(0x7f0000000640)) 15:13:14 executing program 5: socketpair(0x1, 0x5, 0x8f00, &(0x7f0000000640)) 15:13:14 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 1: socketpair(0x1, 0x5, 0xb900, &(0x7f0000000640)) 15:13:15 executing program 5: socketpair(0x1, 0x5, 0x8f01, &(0x7f0000000640)) 15:13:15 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 15:13:15 executing program 1: socketpair(0x1, 0x5, 0xb901, &(0x7f0000000640)) 15:13:15 executing program 5: socketpair(0x1, 0x5, 0x9000, &(0x7f0000000640)) 15:13:15 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 1: socketpair(0x1, 0x5, 0xba00, &(0x7f0000000640)) 15:13:15 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:15 executing program 5: socketpair(0x1, 0x5, 0x9001, &(0x7f0000000640)) 15:13:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 1: socketpair(0x1, 0x5, 0xba01, &(0x7f0000000640)) 15:13:15 executing program 5: socketpair(0x1, 0x5, 0x9100, &(0x7f0000000640)) 15:13:15 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 1: socketpair(0x1, 0x5, 0xbb00, &(0x7f0000000640)) 15:13:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:15 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 5: socketpair(0x1, 0x5, 0x9101, &(0x7f0000000640)) 15:13:15 executing program 1: socketpair(0x1, 0x5, 0xbb01, &(0x7f0000000640)) 15:13:15 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 5: socketpair(0x1, 0x5, 0x9200, &(0x7f0000000640)) 15:13:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:15 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:15 executing program 1: socketpair(0x1, 0x5, 0xbc00, &(0x7f0000000640)) 15:13:15 executing program 5: socketpair(0x1, 0x5, 0x9201, &(0x7f0000000640)) 15:13:16 executing program 1: socketpair(0x1, 0x5, 0xbc01, &(0x7f0000000640)) 15:13:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 5: socketpair(0x1, 0x5, 0x9300, &(0x7f0000000640)) 15:13:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 1: socketpair(0x1, 0x5, 0xbd00, &(0x7f0000000640)) 15:13:16 executing program 5: socketpair(0x1, 0x5, 0x9301, &(0x7f0000000640)) 15:13:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) read$char_raw(r2, &(0x7f0000000c00)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/47616], 0xba00) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x6, 0x4201) r3 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0xf44, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000180)={0x1, 0x0, 0x10000, 0x2, '\x00', 0x5}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x7, 0x0, 0x41], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x13f, 0xd}}, 0x20) 15:13:16 executing program 1: socketpair(0x1, 0x5, 0xbd01, &(0x7f0000000640)) 15:13:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) read$char_raw(r2, &(0x7f0000000c00)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/47616], 0xba00) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x6, 0x4201) r3 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0xf44, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000180)={0x1, 0x0, 0x10000, 0x2, '\x00', 0x5}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x7, 0x0, 0x41], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x13f, 0xd}}, 0x20) 15:13:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 5: socketpair(0x1, 0x5, 0x9400, &(0x7f0000000640)) 15:13:16 executing program 1: socketpair(0x1, 0x5, 0xbe00, &(0x7f0000000640)) 15:13:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) read$char_raw(r2, &(0x7f0000000c00)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/47616], 0xba00) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x6, 0x4201) r3 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0xf44, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000180)={0x1, 0x0, 0x10000, 0x2, '\x00', 0x5}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x7, 0x0, 0x41], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x13f, 0xd}}, 0x20) 15:13:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 5: socketpair(0x1, 0x5, 0x9401, &(0x7f0000000640)) 15:13:16 executing program 1: socketpair(0x1, 0x5, 0xbe01, &(0x7f0000000640)) 15:13:16 executing program 5: socketpair(0x1, 0x5, 0x9500, &(0x7f0000000640)) 15:13:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 1: socketpair(0x1, 0x5, 0xbf00, &(0x7f0000000640)) 15:13:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2d2400, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002180)='/dev/loop-control\x00', 0x400, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002200)='/dev/loop-control\x00', 0x12200, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000002480)={0xc, 0x8, 0xfa00, {&(0x7f0000002300)}}, 0x10) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f00000022c0)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002280)={&(0x7f00000025c0)=ANY=[@ANYBLOB="6400000096ded4ffc30a9635f54b2cd220525a89487866094956c2340761ba484cf7fd29d781fc3d04ee1ec135a30d70bf946e54e20a5336953a60380cace77ea8681893763d5ee45f2532208ce285e670598d380c00202701a3aab77791158cd41530", @ANYRES16=0x0, @ANYBLOB="01002abd7000fcdbdf52d05cc968e81fe680cda967db424b79250200000014003abbebbf00000000fe0e84d1000000000000000000aa080002000700000005000500150000000500050005000000050005000200000014000100fe00000100000000000000000018080002007f000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x40) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000020c0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x5, 0x1, 0x9, 0x6, 0x6, 0x201e, {0x0, 0x7, 0x8, 0x0, 0x1000, 0x9, 0x7, 0x0, 0x8, 0x1000, 0x1f, r5, 0xee01, 0x9, 0x5}}}}, 0xa0) 15:13:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:16 executing program 5: socketpair(0x1, 0x5, 0x9501, &(0x7f0000000640)) 15:13:16 executing program 1: socketpair(0x1, 0x5, 0xbf01, &(0x7f0000000640)) 15:13:16 executing program 5: socketpair(0x1, 0x5, 0x9600, &(0x7f0000000640)) 15:13:16 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0, 0x4}}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:17 executing program 3: select(0x40, &(0x7f0000000000)={0x0, 0x7, 0x1}, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000080)={0x7, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(0xffffffffffffffff, 0x7a4, &(0x7f00000000c0)={{@hyper, 0x1af}, 0x1, 0x1, 0xff, 0x80}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x1, @rand_addr=' \x01\x00'}}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc000, &(0x7f0000000640)) 15:13:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 15:13:17 executing program 5: socketpair(0x1, 0x5, 0x9601, &(0x7f0000000640)) 15:13:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 15:13:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0, 0x4}}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000080)={0x0, 0x1, 0x4, &(0x7f0000000000)=0x8001}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc001, &(0x7f0000000640)) 15:13:17 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) 15:13:17 executing program 5: socketpair(0x1, 0x5, 0x9700, &(0x7f0000000640)) 15:13:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0, 0x4}}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc100, &(0x7f0000000640)) 15:13:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0xa2100) read$char_raw(r1, &(0x7f0000000200)={""/32292}, 0x8000) 15:13:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:17 executing program 5: socketpair(0x1, 0x5, 0x9701, &(0x7f0000000640)) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc101, &(0x7f0000000640)) 15:13:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0xa2100) read$char_raw(r1, &(0x7f0000000200)={""/32292}, 0x8000) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc200, &(0x7f0000000640)) 15:13:17 executing program 5: socketpair(0x1, 0x5, 0x9800, &(0x7f0000000640)) 15:13:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:17 executing program 2: socketpair(0x1, 0x5, 0x7d01, &(0x7f0000000640)) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc201, &(0x7f0000000640)) 15:13:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:17 executing program 0: socketpair(0x1, 0x5, 0x7c00, &(0x7f0000000640)) 15:13:17 executing program 5: socketpair(0x1, 0x5, 0x9801, &(0x7f0000000640)) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc300, &(0x7f0000000640)) 15:13:17 executing program 2: socketpair(0x1, 0x5, 0xc201, &(0x7f0000000640)) 15:13:17 executing program 3: r0 = syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000040)={0xffff}) read$char_raw(r0, 0x0, 0x0) r2 = syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) ioctl$CHAR_RAW_ZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x1f, 0x1ff}) 15:13:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:17 executing program 5: socketpair(0x1, 0x5, 0x9900, &(0x7f0000000640)) 15:13:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:17 executing program 1: socketpair(0x1, 0x5, 0xc301, &(0x7f0000000640)) 15:13:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:17 executing program 3: r0 = syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000040)={0xffff}) read$char_raw(r0, 0x0, 0x0) r2 = syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) ioctl$CHAR_RAW_ZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x1f, 0x1ff}) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc400, &(0x7f0000000640)) 15:13:18 executing program 5: socketpair(0x1, 0x5, 0x9901, &(0x7f0000000640)) 15:13:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:18 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc401, &(0x7f0000000640)) 15:13:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:18 executing program 3: r0 = syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000040)={0xffff}) read$char_raw(r0, 0x0, 0x0) r2 = syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) ioctl$CHAR_RAW_ZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x1f, 0x1ff}) 15:13:18 executing program 5: socketpair(0x1, 0x5, 0x9a00, &(0x7f0000000640)) 15:13:18 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc500, &(0x7f0000000640)) 15:13:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:18 executing program 5: socketpair(0x1, 0x5, 0x9a01, &(0x7f0000000640)) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc501, &(0x7f0000000640)) 15:13:18 executing program 3: r0 = syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000040)={0xffff}) read$char_raw(r0, 0x0, 0x0) syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) 15:13:18 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:18 executing program 5: socketpair(0x1, 0x5, 0x9b00, &(0x7f0000000640)) 15:13:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:18 executing program 3: syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r0, 0x127f, &(0x7f0000000040)={0xffff}) syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) 15:13:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x240, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc600, &(0x7f0000000640)) 15:13:18 executing program 5: socketpair(0x1, 0x5, 0x9b01, &(0x7f0000000640)) 15:13:18 executing program 3: syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) 15:13:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc601, &(0x7f0000000640)) 15:13:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x240, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:18 executing program 0: socketpair(0x1, 0x5, 0x5000, &(0x7f0000000640)) 15:13:18 executing program 5: socketpair(0x1, 0x5, 0x9c00, &(0x7f0000000640)) 15:13:18 executing program 3: syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) 15:13:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc700, &(0x7f0000000640)) 15:13:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80c00, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:18 executing program 5: socketpair(0x1, 0x5, 0x9c01, &(0x7f0000000640)) 15:13:18 executing program 3: syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x629c0) syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) 15:13:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:18 executing program 1: socketpair(0x1, 0x5, 0xc701, &(0x7f0000000640)) 15:13:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000440)={0x0, 0x40, 0x2, &(0x7f0000000400)=0x5}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x210200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000900)={{0x9, 0x3, 0x87, 0x200, '\x00', 0xff}, 0x1, [0x3, 0x3, 0x6, 0x59a000000, 0xc5, 0x2, 0xa4, 0x6, 0x6, 0x7, 0x7, 0x8, 0x0, 0x8000, 0x1, 0x5, 0x7, 0x0, 0xfffffffd, 0x100000001, 0xd44, 0x1f, 0xffff, 0xe7, 0x1, 0x8, 0x0, 0x5, 0x4, 0x8, 0x4, 0x3f, 0x8f, 0x7ff, 0x63aa9cdf, 0xfff, 0x1f, 0x7, 0x7, 0x6, 0x7fffffff, 0x1003, 0x95, 0x401, 0x51, 0x94e, 0x5, 0x3ff, 0x843, 0x1, 0x9, 0x5, 0xa91c, 0x102, 0x3, 0x6b1e, 0xff, 0x10001, 0x100000001, 0x2e10, 0x5, 0x0, 0x8, 0x7, 0x8, 0x4, 0x10001, 0x0, 0x5, 0x4, 0x1, 0x4c3d, 0x6, 0xfffffffffffffff9, 0x7, 0xb5, 0x3, 0xf0c, 0x0, 0x9, 0x5, 0x9, 0x5, 0xfffffffe000, 0x5d2, 0x6cd1, 0x7c562c21, 0x7, 0xd4, 0x4, 0x5, 0x7, 0xffffffffffff3acb, 0x7, 0x400040, 0x100000000, 0x0, 0x80000000, 0x7, 0x2, 0xd1, 0x7ff, 0x70, 0x3ff, 0xfffffffffffffffe, 0x1, 0x0, 0x8, 0x1, 0x80000001, 0x40000000000000, 0x4, 0xbf9, 0x1, 0x5, 0xc230, 0x7, 0x2, 0x3a, 0x0, 0x0, 0x7, 0xf0e1, 0x100, 0x9, 0x8000, 0x6e, 0x1000]}) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000080)={0xa, 0x4}, 0xc) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x13}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r7, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"ce3fb449f8ec43248457a000"}}}}, 0xa0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r7, 0x1}}, 0x18) 15:13:19 executing program 3: syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x22081) 15:13:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80c00, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0x9d00, &(0x7f0000000640)) 15:13:19 executing program 1: socketpair(0x1, 0x5, 0xc800, &(0x7f0000000640)) 15:13:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80c00, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0x9d01, &(0x7f0000000640)) 15:13:19 executing program 3: syz_open_dev$char_raw(0xffffffffffffffff, 0x1, 0x0) 15:13:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 1: socketpair(0x1, 0x5, 0xc801, &(0x7f0000000640)) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0x9e00, &(0x7f0000000640)) 15:13:19 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000440)={0x0, 0x40, 0x2, &(0x7f0000000400)=0x5}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x210200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000900)={{0x9, 0x3, 0x87, 0x200, '\x00', 0xff}, 0x1, [0x3, 0x3, 0x6, 0x59a000000, 0xc5, 0x2, 0xa4, 0x6, 0x6, 0x7, 0x7, 0x8, 0x0, 0x8000, 0x1, 0x5, 0x7, 0x0, 0xfffffffd, 0x100000001, 0xd44, 0x1f, 0xffff, 0xe7, 0x1, 0x8, 0x0, 0x5, 0x4, 0x8, 0x4, 0x3f, 0x8f, 0x7ff, 0x63aa9cdf, 0xfff, 0x1f, 0x7, 0x7, 0x6, 0x7fffffff, 0x1003, 0x95, 0x401, 0x51, 0x94e, 0x5, 0x3ff, 0x843, 0x1, 0x9, 0x5, 0xa91c, 0x102, 0x3, 0x6b1e, 0xff, 0x10001, 0x100000001, 0x2e10, 0x5, 0x0, 0x8, 0x7, 0x8, 0x4, 0x10001, 0x0, 0x5, 0x4, 0x1, 0x4c3d, 0x6, 0xfffffffffffffff9, 0x7, 0xb5, 0x3, 0xf0c, 0x0, 0x9, 0x5, 0x9, 0x5, 0xfffffffe000, 0x5d2, 0x6cd1, 0x7c562c21, 0x7, 0xd4, 0x4, 0x5, 0x7, 0xffffffffffff3acb, 0x7, 0x400040, 0x100000000, 0x0, 0x80000000, 0x7, 0x2, 0xd1, 0x7ff, 0x70, 0x3ff, 0xfffffffffffffffe, 0x1, 0x0, 0x8, 0x1, 0x80000001, 0x40000000000000, 0x4, 0xbf9, 0x1, 0x5, 0xc230, 0x7, 0x2, 0x3a, 0x0, 0x0, 0x7, 0xf0e1, 0x100, 0x9, 0x8000, 0x6e, 0x1000]}) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000080)={0xa, 0x4}, 0xc) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x13}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r7, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"ce3fb449f8ec43248457a000"}}}}, 0xa0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r7, 0x1}}, 0x18) 15:13:19 executing program 1: socketpair(0x1, 0x5, 0xc900, &(0x7f0000000640)) 15:13:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0x9e01, &(0x7f0000000640)) 15:13:19 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 1: socketpair(0x1, 0x5, 0xc901, &(0x7f0000000640)) 15:13:19 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0x9f00, &(0x7f0000000640)) 15:13:19 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0x9f01, &(0x7f0000000640)) 15:13:19 executing program 1: socketpair(0x1, 0x5, 0xca00, &(0x7f0000000640)) 15:13:19 executing program 2: ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(0xffffffffffffffff, 0x7b1, &(0x7f00000010c0)={&(0x7f00000000c0)=[0x10001, 0x8000, 0x19, 0x10000, 0x0, 0x9, 0x8001, 0x2, 0x7f, 0x80000001, 0x7f, 0x401, 0x1f, 0xff, 0x77c, 0x5, 0x8000, 0xfff, 0xfffffffd, 0x0, 0x7b, 0x7, 0x2, 0x4, 0x9, 0xc84, 0x20, 0x4, 0x8, 0x10000, 0x1, 0x6, 0x2, 0x2, 0x1f, 0x7, 0x7f, 0x1, 0xcb1, 0xa1, 0x3, 0x7, 0x10000, 0x6, 0xc3, 0x2, 0x1, 0x3ff, 0x7, 0x10000, 0xed88, 0x5, 0x60, 0xfffffffd, 0x0, 0x401, 0x8000, 0x101, 0x459, 0x800, 0x4, 0xfffffffa, 0x91, 0x2, 0x7, 0x1, 0x8, 0x598, 0x0, 0x1, 0x7, 0x20eb, 0x4, 0x4, 0x4, 0xa450, 0x2, 0x6, 0xf6a8, 0x1, 0x2, 0x6, 0xe8f, 0x10001, 0xfffff485, 0x6, 0x3, 0xfff, 0x7ff, 0x5, 0x80000000, 0x728, 0x6587, 0x0, 0x846, 0x5, 0x3, 0x2, 0x9, 0x9, 0x4, 0xffff, 0x6c97, 0x0, 0x4, 0x3, 0x8, 0x3, 0x9, 0x5629, 0xff, 0xffffffff, 0xffff, 0x3ff, 0x7fffffff, 0xfffffff7, 0xd989, 0x2a4b, 0xa2f, 0x10001, 0x0, 0x5, 0xfffffff9, 0xe33493c7, 0x7, 0x4, 0x6, 0x504, 0x7, 0x1f, 0x8, 0x3df, 0x2, 0x80000000, 0x40, 0x3, 0x46, 0x11, 0x2, 0xff, 0x8, 0x10001, 0x7bbb, 0xffffff28, 0x0, 0x40000, 0x8, 0x7, 0x6, 0x200, 0x0, 0x3f, 0xb8f9, 0x0, 0x800, 0x40, 0xfffeffff, 0x100, 0x844, 0x17d4, 0x3, 0x1bc, 0x1, 0x1000, 0x20, 0x6, 0x2, 0x80, 0x8000, 0x1000, 0x3f1, 0x9, 0xfffffffd, 0xfffffffd, 0x2, 0x8, 0x81, 0x1, 0x3, 0x9, 0x2, 0x6ac, 0x4, 0xffff, 0x1, 0x7f, 0x6, 0x0, 0xfff, 0x2, 0x4, 0x10001, 0x8b99, 0x3, 0x200, 0x8, 0x3, 0x2, 0x0, 0xfffff3b0, 0x1ff, 0xffffff7f, 0x6, 0x1, 0x4, 0x44, 0x119, 0x6, 0x70000000, 0x10000, 0x5, 0x57, 0x0, 0x4, 0x401, 0x8000, 0x10000, 0x2, 0x3, 0x80000001, 0x8, 0x1000, 0x88, 0x1, 0x75, 0x3, 0xfb, 0x4, 0x2, 0x9, 0x3f, 0x5, 0x9, 0x2, 0x3, 0x1ff, 0x0, 0x4e, 0x80, 0x1000, 0xff, 0x2, 0x0, 0xffff7fff, 0x9, 0x2, 0xfffffc6a, 0x8, 0x80000000, 0x4d73, 0x20, 0xa7d5, 0x3, 0x0, 0x6, 0x4, 0x5, 0x1e36, 0xfffffffe, 0x4, 0x1f, 0x4f1, 0x401, 0x5, 0x9, 0x2, 0x7ff, 0x2, 0x3, 0x401, 0x2, 0x10001, 0x800, 0x0, 0x7, 0x9, 0x942f, 0x10001, 0x49, 0xd28, 0xffffff91, 0x0, 0x6, 0x1000, 0x7f, 0x7, 0xd3f, 0x0, 0x3f, 0x8, 0x8, 0x6, 0x101, 0x7a3, 0x1f80, 0x3, 0x9b6a, 0x6, 0x3, 0x6, 0x2, 0x2, 0xffffffff, 0x0, 0x9, 0x7fff, 0x8, 0x0, 0x400, 0x4, 0x2, 0x8, 0x4, 0x0, 0x0, 0x8000000, 0x62, 0x0, 0xc4, 0xfff, 0x9, 0x8a1, 0x2003, 0x18, 0xe6e6, 0x9, 0x81, 0x11, 0x7, 0xfffffffd, 0x7, 0x80000001, 0xcb0, 0x100, 0x2, 0x35, 0x9, 0xdd2a, 0x0, 0xfffff74e, 0x3fa2662d, 0x0, 0x40, 0xa37, 0x80000000, 0x4169, 0x4, 0x4, 0x6, 0x0, 0x0, 0x2, 0xa80, 0x2, 0x10001, 0x3ee, 0x2, 0x2, 0xf15, 0x7fffffff, 0xfff, 0x8d, 0x1, 0x100, 0x5, 0x1000, 0x1e9f, 0x3ff, 0x4, 0x1, 0x3ff, 0x5, 0x3, 0xfd, 0x7, 0x9, 0x0, 0xff, 0x8, 0xfffffe01, 0xe917, 0x17, 0x3, 0x7, 0x9, 0x8001, 0x20, 0xfffffff8, 0x80a, 0x9, 0x7fffffff, 0x684, 0x401, 0x2000000, 0x3f, 0xfe60, 0x4, 0xfffffff8, 0x3ff, 0xd9, 0x1f, 0x1, 0x5e24, 0x9, 0x6, 0x7, 0x9, 0xffffff00, 0x7, 0x49fd, 0x1, 0x18d58eb4, 0x7, 0x5, 0x7b3, 0x80000001, 0x0, 0x1, 0x7, 0xee, 0x401, 0x10000, 0x80000000, 0x101, 0xfff, 0x5, 0x9, 0x4, 0x4, 0x3, 0x5, 0x7, 0x7, 0xe, 0x400, 0x97, 0xfff, 0x1ff, 0x9, 0xda, 0x3, 0x1, 0xd1, 0x7f, 0xe2, 0x5, 0xfffffffc, 0x7f, 0x7ff, 0x0, 0x40, 0xc547, 0x3860ada0, 0x8be4, 0x3, 0x5, 0x4, 0xc1, 0x400, 0x9211, 0x9, 0xd1b1, 0x7, 0xfff, 0x20, 0x7fff, 0xd8, 0x3, 0x0, 0xff, 0x100, 0x1, 0x7fffffff, 0x0, 0x7, 0x8, 0x1, 0xff, 0x4, 0x1, 0x892a, 0x2, 0x7101, 0x0, 0x200, 0x5, 0x6, 0x5, 0x6, 0x8001, 0xffffffff, 0x80000001, 0x0, 0x5, 0x5, 0x703e, 0x5, 0x7, 0x1, 0x8, 0x56cf, 0xfffffffb, 0x6, 0xb43, 0xff, 0x4f, 0x100, 0x54, 0x0, 0x598, 0x9, 0x80000001, 0x9, 0x1, 0x9, 0x7, 0x8, 0x800, 0x0, 0x40, 0x2400, 0x9, 0x0, 0x3, 0x6, 0x0, 0xbaf, 0x20, 0x5, 0x20000000, 0x9, 0x8001, 0x8, 0xa0, 0x9, 0x8, 0x4, 0x3, 0x1, 0x400, 0x1, 0x6, 0x2, 0x20, 0x4ebe, 0x1, 0x80, 0x4, 0x147e, 0x4, 0x54d4004b, 0x0, 0x2, 0x0, 0x3f, 0x7, 0x0, 0x77, 0x4, 0xffffffff, 0x2, 0x1e11, 0x7, 0x5, 0xffff, 0x9, 0x4, 0x2, 0x6, 0x7fff, 0xffff, 0x5, 0xff, 0x7f, 0x2, 0xc116, 0x4, 0x7, 0x3, 0x4, 0x6, 0x0, 0x5081, 0x7, 0xffff, 0x3, 0x3, 0x5, 0x9, 0x10001, 0x5, 0x4, 0x10000, 0x3, 0x1, 0x2523d9de, 0x6, 0x81, 0x1ff, 0x2, 0x6, 0x8, 0x200, 0x4, 0x800, 0xe1d, 0x5, 0x9, 0xfffffe3b, 0x0, 0x6, 0xffff8001, 0xb237, 0x400, 0x0, 0xfff, 0xff, 0xfffffc00, 0x8001, 0x81, 0x80000000, 0x101, 0x8, 0x9b, 0x8, 0x7, 0x1, 0x400000, 0xccff, 0x7, 0xb67c0000, 0x401, 0x80000001, 0x0, 0x3e7, 0x6, 0x7f, 0x78d7, 0x7fffffff, 0xa0, 0x9, 0xc33, 0x3, 0x346e01c3, 0x6, 0x543, 0xfffffff8, 0xb3f5, 0x0, 0x0, 0x10000, 0x977, 0x101, 0x80, 0xc867, 0xffffffff, 0x5f49, 0x9, 0x5, 0x2, 0x0, 0x401, 0x7ff, 0x80000000, 0x5, 0x7f, 0x653c, 0x3ff, 0x7, 0x8000, 0x1, 0x1000, 0x4, 0x9, 0xffffffff, 0x1, 0x80000000, 0x4, 0x2f8c, 0x45, 0x7, 0x1e, 0x6, 0xfff, 0x1, 0x0, 0x200, 0x7fffffff, 0x1000, 0x2, 0x5, 0xfffffffc, 0x200, 0x3701, 0x5, 0x80000001, 0xff, 0x80000001, 0x4, 0x9, 0x48, 0x6, 0x8, 0x7, 0x1f, 0x4, 0x5, 0x5, 0x7, 0xb0e, 0xe25, 0x4, 0x9, 0xfff, 0x4, 0x1800000, 0x6, 0x3e, 0xff, 0x0, 0x8, 0x4, 0x7fffffff, 0x489, 0x6, 0x7, 0x8, 0x3ff, 0x8, 0x0, 0x3ff, 0x4, 0x8, 0x0, 0x2, 0x0, 0x3ff, 0x7fff, 0x406, 0x80000000, 0x0, 0x3f, 0x1, 0xfffff801, 0xffffffff, 0x7, 0x9, 0x8, 0x0, 0x7fff, 0x1f8f, 0x42, 0x3f, 0x80, 0x9, 0x7ff, 0x4, 0x8, 0x38, 0x7, 0xb8, 0x5, 0x3, 0x9, 0x1f, 0x3f, 0x16c, 0x5, 0x0, 0x4a, 0x6, 0x1, 0x8, 0xdf2d, 0x5, 0x8, 0x6ce7, 0x4, 0xff, 0x6, 0x2, 0xfffffbff, 0x1, 0x4, 0xa99, 0xcb2, 0x9, 0x0, 0x3, 0x7, 0x3, 0x0, 0x5daa, 0x3ff, 0x4, 0x80, 0xb5, 0x2, 0x0, 0x7, 0x9, 0xffffffff, 0x8, 0x0, 0x5, 0x401, 0x9d56, 0x3, 0x7fffffff, 0xf9f, 0x6, 0x6, 0x3, 0x7, 0x100, 0x1c0, 0x800, 0x3, 0x9, 0x9, 0x4, 0x8, 0xfffffe00, 0x1, 0xa3, 0xfffffff8, 0x1f, 0x7, 0x21f, 0x9, 0x3, 0x100, 0x6, 0x40, 0x7, 0x4, 0x2, 0xfffffffd, 0x4, 0x81, 0x4, 0x8, 0x200, 0xac, 0x4, 0xc6, 0x8, 0x6, 0xffff, 0x0, 0x0, 0xff, 0x40, 0x2, 0xffffffff, 0xfffffffe, 0x0, 0x4, 0x29be, 0x1, 0x6, 0x4601, 0x6, 0x100, 0x9, 0x5, 0xb337, 0x4c77, 0x0, 0x1000, 0x5, 0x7c6, 0x9, 0x8, 0x1c, 0x7, 0x7a53, 0x1, 0x7, 0xca8f, 0xfff, 0x3ff, 0x50, 0x1000, 0x7ff, 0x8000, 0x4, 0xdf3, 0x6, 0xfffffffc, 0x4, 0x1014, 0x5, 0xfffe0000, 0x2fa7, 0x6, 0x8, 0x7fffffff, 0x8000, 0xffffff25, 0x1, 0x4, 0x5b8d, 0x40, 0x9740000, 0x0, 0x6, 0x5, 0x7, 0xfffffff8, 0x1f, 0x5, 0x8, 0x4f95, 0x7fffffff, 0xfffffffd, 0x6, 0x1f, 0x4f, 0x2, 0x401, 0x3, 0xfc4, 0x6, 0x7, 0xffff, 0x9, 0x1ff, 0x3, 0x5648, 0x38, 0x24e1, 0x9, 0x7fff, 0x7, 0x7ff, 0x7, 0x20000, 0x22, 0x101, 0x0, 0x4, 0x7, 0x10000, 0x1, 0x10000, 0x3, 0x2, 0x2, 0x3f, 0x3e, 0x2, 0x8, 0x101, 0x1000, 0x1, 0x81, 0x4, 0x9, 0x9, 0x6, 0x81, 0x0, 0x0, 0x2, 0x8, 0x7, 0x4, 0x1, 0x0, 0x1ff, 0x2, 0x5, 0x0, 0x100, 0xfffffff7, 0x0, 0x40, 0x0, 0x5da, 0x3, 0x80000000, 0xffffffff, 0x0, 0xb4f, 0x0, 0x40, 0x1, 0xfffffc01, 0x16, 0x1, 0x0, 0x800, 0xde, 0x523, 0x0, 0x1af4d10f, 0x2, 0x0, 0xffffffff, 0x0, 0x2, 0x44, 0x5, 0x80, 0x8, 0x9, 0x8, 0x8, 0x8, 0xa1e, 0x7fffffff, 0x9, 0xbf46, 0x795d, 0x7, 0x4, 0x8001, 0x80000000, 0x4, 0x9, 0x2, 0x7, 0x20], 0x2, 0x400, 0x7, 0xfffffffd}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6}, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000001100)=""/80, &(0x7f0000001180)=0x50) 15:13:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 1: socketpair(0x1, 0x5, 0xca01, &(0x7f0000000640)) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0xa000, &(0x7f0000000640)) 15:13:19 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0xffffffff, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:19 executing program 5: socketpair(0x1, 0x5, 0xa001, &(0x7f0000000640)) 15:13:19 executing program 1: socketpair(0x1, 0x5, 0xcb00, &(0x7f0000000640)) 15:13:19 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa100, &(0x7f0000000640)) 15:13:20 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x80b41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r1) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) write$FUSE_GETXATTR(r4, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xcb01, &(0x7f0000000640)) 15:13:20 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa101, &(0x7f0000000640)) 15:13:20 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:20 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xcc00, &(0x7f0000000640)) 15:13:20 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x0, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x80b41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r1) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) write$FUSE_GETXATTR(r4, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) 15:13:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa200, &(0x7f0000000640)) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xcc01, &(0x7f0000000640)) 15:13:20 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x0, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xcd00, &(0x7f0000000640)) 15:13:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x80b41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r1) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) write$FUSE_GETXATTR(r4, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) 15:13:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa201, &(0x7f0000000640)) 15:13:20 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x0, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xcd01, &(0x7f0000000640)) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa300, &(0x7f0000000640)) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xce00, &(0x7f0000000640)) 15:13:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:20 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xce01, &(0x7f0000000640)) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa301, &(0x7f0000000640)) 15:13:20 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa400, &(0x7f0000000640)) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xcf00, &(0x7f0000000640)) 15:13:20 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:20 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:20 executing program 1: socketpair(0x1, 0x5, 0xcf01, &(0x7f0000000640)) 15:13:20 executing program 5: socketpair(0x1, 0x5, 0xa401, &(0x7f0000000640)) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa500, &(0x7f0000000640)) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd000, &(0x7f0000000640)) 15:13:21 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x240, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa501, &(0x7f0000000640)) 15:13:21 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd001, &(0x7f0000000640)) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa600, &(0x7f0000000640)) 15:13:21 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa601, &(0x7f0000000640)) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd100, &(0x7f0000000640)) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x2, 0x4}, &(0x7f0000000100)=0x8) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002200)={0x60, 0x0, r5, {{0x0, 0x101, 0xb2, 0x3f, 0x401, 0x100, 0x5, 0xffffffc0}}}, 0x60) 15:13:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd101, &(0x7f0000000640)) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa700, &(0x7f0000000640)) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0x0, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd200, &(0x7f0000000640)) 15:13:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x2, 0x4}, &(0x7f0000000100)=0x8) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002200)={0x60, 0x0, r5, {{0x0, 0x101, 0xb2, 0x3f, 0x401, 0x100, 0x5, 0xffffffc0}}}, 0x60) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa701, &(0x7f0000000640)) 15:13:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0x0, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x2, 0x4}, &(0x7f0000000100)=0x8) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002200)={0x60, 0x0, r5, {{0x0, 0x101, 0xb2, 0x3f, 0x401, 0x100, 0x5, 0xffffffc0}}}, 0x60) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa800, &(0x7f0000000640)) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd201, &(0x7f0000000640)) 15:13:21 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0x0, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x2, 0x4}, &(0x7f0000000100)=0x8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa801, &(0x7f0000000640)) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd300, &(0x7f0000000640)) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x0, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa900, &(0x7f0000000640)) 15:13:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x2, 0x4}, &(0x7f0000000100)=0x8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x0, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 1: socketpair(0x1, 0x5, 0xd301, &(0x7f0000000640)) 15:13:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x2, 0x4}, &(0x7f0000000100)=0x8) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xa901, &(0x7f0000000640)) 15:13:21 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x0, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:21 executing program 5: socketpair(0x1, 0x5, 0xaa00, &(0x7f0000000640)) 15:13:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r2, 0x7b1, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r2, 0x7a6, &(0x7f0000000000)={0x7, 0x44f, 0x6, 0xf1f9, 0x8, 0x1ff}) 15:13:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd400, &(0x7f0000000640)) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x0, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 3: r0 = syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r1, 0x40081271, &(0x7f0000000000)=0xe) read$char_raw(r0, 0x0, 0x0) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xaa01, &(0x7f0000000640)) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd401, &(0x7f0000000640)) 15:13:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x20240, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000000c0)={0x5, 0x4, 0x0, 0xffffffff, [], [], [], 0x6, 0x800, 0x3, 0x2, "dcf299e6f3189997d3d9b213ffbe3883"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(0xffffffffffffffff, 0x7a9, &(0x7f0000000000)={{@my=0x0}, 0x80000000000000, 0x10001, 0x554, 0xfcd, 0x80, 0x1, 0x1cd9d0b4, 0x1}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f0000000340)=""/50, 0x32}, {&(0x7f0000000380)=""/154, 0x9a}], 0x3, &(0x7f0000000480)=""/110, 0x6e}, 0x20) setsockopt$packet_int(r2, 0x107, 0xc, &(0x7f0000000200)=0xfffffe01, 0x4) 15:13:22 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd500, &(0x7f0000000640)) 15:13:22 executing program 2: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x10}, 0x0) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x0, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xab00, &(0x7f0000000640)) 15:13:22 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) 15:13:22 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) select(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0) 15:13:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x20240, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000000c0)={0x5, 0x4, 0x0, 0xffffffff, [], [], [], 0x6, 0x800, 0x3, 0x2, "dcf299e6f3189997d3d9b213ffbe3883"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(0xffffffffffffffff, 0x7a9, &(0x7f0000000000)={{@my=0x0}, 0x80000000000000, 0x10001, 0x554, 0xfcd, 0x80, 0x1, 0x1cd9d0b4, 0x1}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f0000000340)=""/50, 0x32}, {&(0x7f0000000380)=""/154, 0x9a}], 0x3, &(0x7f0000000480)=""/110, 0x6e}, 0x20) setsockopt$packet_int(r2, 0x107, 0xc, &(0x7f0000000200)=0xfffffe01, 0x4) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd501, &(0x7f0000000640)) 15:13:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x20240, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000000c0)={0x5, 0x4, 0x0, 0xffffffff, [], [], [], 0x6, 0x800, 0x3, 0x2, "dcf299e6f3189997d3d9b213ffbe3883"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(0xffffffffffffffff, 0x7a9, &(0x7f0000000000)={{@my=0x0}, 0x80000000000000, 0x10001, 0x554, 0xfcd, 0x80, 0x1, 0x1cd9d0b4, 0x1}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f0000000340)=""/50, 0x32}, {&(0x7f0000000380)=""/154, 0x9a}], 0x3, &(0x7f0000000480)=""/110, 0x6e}, 0x20) setsockopt$packet_int(r2, 0x107, 0xc, &(0x7f0000000200)=0xfffffe01, 0x4) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x0, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xab01, &(0x7f0000000640)) 15:13:22 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd600, &(0x7f0000000640)) 15:13:22 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) select(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:22 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @in6={0xa, 0x4e21, 0xbeb9, @mcast1, 0x7}}}, 0x90) r5 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r5, 0x5421, &(0x7f00000002c0)) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xac00, &(0x7f0000000640)) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd601, &(0x7f0000000640)) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) select(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd700, &(0x7f0000000640)) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xac01, &(0x7f0000000640)) 15:13:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x201, 0xa9, 0x2, r2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000000)={0x9d, 0x1000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0xfffffffffffffffb, 0x0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd701, &(0x7f0000000640)) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xad00, &(0x7f0000000640)) 15:13:22 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000002280)=0x3, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x201, 0xa9, 0x2, r2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000000)={0x9d, 0x1000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0x0, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xad01, &(0x7f0000000640)) 15:13:22 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd800, &(0x7f0000000640)) 15:13:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x201, 0xa9, 0x2, r2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000000)={0x9d, 0x1000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0x0, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xae00, &(0x7f0000000640)) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd801, &(0x7f0000000640)) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x1080000000000000, 0x0, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:22 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x6, 0x0, 0x800000000000000}, 0x0) 15:13:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x0, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:22 executing program 1: socketpair(0x1, 0x5, 0xd900, &(0x7f0000000640)) 15:13:22 executing program 5: socketpair(0x1, 0x5, 0xae01, &(0x7f0000000640)) 15:13:22 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 3: r0 = syz_open_dev$char_raw(&(0x7f0000002180)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r0, 0x0, 0x223) 15:13:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x0, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xd901, &(0x7f0000000640)) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xaf00, &(0x7f0000000640)) 15:13:23 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 3 (fault-call:2 fault-nth:0): ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x1f800000000000, 0x0, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xaf01, &(0x7f0000000640)) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xda00, &(0x7f0000000640)) 15:13:23 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xb000, &(0x7f0000000640)) 15:13:23 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x200, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xda01, &(0x7f0000000640)) 15:13:23 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x2, 0x0) 15:13:23 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xb001, &(0x7f0000000640)) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xdb00, &(0x7f0000000640)) 15:13:23 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xb100, &(0x7f0000000640)) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xdb01, &(0x7f0000000640)) 15:13:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xb101, &(0x7f0000000640)) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xdc00, &(0x7f0000000640)) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c82, 0x0) 15:13:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xdc01, &(0x7f0000000640)) 15:13:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xb200, &(0x7f0000000640)) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5421, 0x0) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xdd00, &(0x7f0000000640)) 15:13:23 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000140)=0xff, 0x4) 15:13:23 executing program 5: socketpair(0x1, 0x5, 0xb201, &(0x7f0000000640)) 15:13:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:23 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5450, 0x0) 15:13:23 executing program 1: socketpair(0x1, 0x5, 0xdd01, &(0x7f0000000640)) 15:13:23 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb300, &(0x7f0000000640)) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xde00, &(0x7f0000000640)) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0x0, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0x0, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xde01, &(0x7f0000000640)) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5451, 0x0) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb301, &(0x7f0000000640)) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, 0x0) 15:13:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0x0, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5452, 0x0) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xdf00, &(0x7f0000000640)) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb400, &(0x7f0000000640)) 15:13:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, 0x0) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x0, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb401, &(0x7f0000000640)) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xdf01, &(0x7f0000000640)) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5460, 0x0) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, 0x0) 15:13:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140), 0x4) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x0, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x40049409, 0x0) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb500, &(0x7f0000000640)) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb501, &(0x7f0000000640)) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xe000, &(0x7f0000000640)) 15:13:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x0, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4020940d, 0x0) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x0, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xe001, &(0x7f0000000640)) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb600, &(0x7f0000000640)) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x0, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x0, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb601, &(0x7f0000000640)) 15:13:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xe0ff, &(0x7f0000000640)) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) 15:13:24 executing program 0: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xe100, &(0x7f0000000640)) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb700, &(0x7f0000000640)) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x0, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb701, &(0x7f0000000640)) 15:13:24 executing program 0: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 15:13:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) 15:13:24 executing program 1: socketpair(0x1, 0x5, 0xe101, &(0x7f0000000640)) 15:13:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x0, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:24 executing program 0: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) 15:13:24 executing program 5: socketpair(0x1, 0x5, 0xb800, &(0x7f0000000640)) 15:13:24 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc020660b, 0x0) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe200, &(0x7f0000000640)) 15:13:25 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x0, &(0x7f0000000080)=[{}, {}]}) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x0, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xb801, &(0x7f0000000640)) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe201, &(0x7f0000000640)) 15:13:25 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:25 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(0xffffffffffffffff, 0x7a8, &(0x7f0000000080)={{@hyper, 0x5}, @local, 0x4, 0xfffffffffffffffb, 0x200, 0x1, 0x8, 0x6}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xb900, &(0x7f0000000640)) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x0, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x0, &(0x7f0000000080)=[{}]}) 15:13:25 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe300, &(0x7f0000000640)) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x0, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xb901, &(0x7f0000000640)) 15:13:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) 15:13:25 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) 15:13:25 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000000)={0xffffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1, 0xabc, 0x397a87e8}, &(0x7f0000000140)=0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0xf9, 0x522c1) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000001c0)={0x8}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x9, 0x1, 0x7, 0x6, 0x0, 0x4, 0x1000, 0x7], 0x9, 0x80800}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x9a280, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe301, &(0x7f0000000640)) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x0, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) 15:13:25 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xba00, &(0x7f0000000640)) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe400, &(0x7f0000000640)) 15:13:25 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x4000, 0x0) 15:13:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x0, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe401, &(0x7f0000000640)) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xba01, &(0x7f0000000640)) 15:13:25 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000040)={0x100000000}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x0, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe500, &(0x7f0000000640)) 15:13:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xbb00, &(0x7f0000000640)) 15:13:25 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000140)={0x8, 0x3, 0xff, 0x6, &(0x7f0000000080)=[{}, {}, {}]}) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x0, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 15:13:25 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x6, @remote, 0x200}, @in6={0xa, 0x4e21, 0x80000001, @private2={0xfc, 0x2, [], 0x1}, 0x7}, @in6={0xa, 0x4e20, 0x62, @mcast2, 0xbfa5}, @in6={0xa, 0x4e21, 0xfffff000, @dev={0xfe, 0x80, [], 0x22}, 0x6}], 0x80) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x900}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000180)=0xfffffffd) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe501, &(0x7f0000000640)) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xbb01, &(0x7f0000000640)) 15:13:25 executing program 2: socketpair(0x1, 0x5, 0xe500, &(0x7f0000000640)) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x0, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe600, &(0x7f0000000640)) 15:13:25 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000080), 0x0, 0x80000}) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x20040, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x44800, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0xca35, 0x63, 0x9, 0x2, 0x9]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x400}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xbe0}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffff}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x50000004}, 0x40000c0) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 5: socketpair(0x1, 0x5, 0xbc00, &(0x7f0000000640)) 15:13:25 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 0: socketpair(0x1, 0x5, 0xb200, &(0x7f0000000640)) 15:13:25 executing program 1: socketpair(0x1, 0x5, 0xe601, &(0x7f0000000640)) 15:13:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:25 executing program 0: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c82, 0x0) 15:13:26 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f00000000c0)={0x0, 0xffff, 0x5, &(0x7f0000000080)=0x6}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000140)=0x8) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xe700, &(0x7f0000000640)) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xbc01, &(0x7f0000000640)) 15:13:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xe701, &(0x7f0000000640)) 15:13:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xbd00, &(0x7f0000000640)) 15:13:26 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) connect$packet(r0, &(0x7f0000000200)={0x11, 0x1b, r3, 0x1, 0xa5, 0x6, @local}, 0x14) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000080)={0x9}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = accept$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r6 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x8, 0x10800) ioctl$DRM_IOCTL_AGP_FREE(r6, 0x40206435, &(0x7f0000000100)) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000300)=@req={0x1, 0xa1f, 0x7fff, 0x81}, 0x10) r7 = socket$can_raw(0x1d, 0x3, 0x1) getpeername(r7, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000003c0)=0x80) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 15:13:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xe800, &(0x7f0000000640)) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xbd01, &(0x7f0000000640)) 15:13:26 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xbe00, &(0x7f0000000640)) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xe801, &(0x7f0000000640)) 15:13:26 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xbe01, &(0x7f0000000640)) 15:13:26 executing program 3: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0xfffffffffffffffa, 0x0, 0x10000}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x6039, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f00000000c0)={0xffffffff, r0}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x40100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x8002}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000001c0)={0x6, r2}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000100)={0x2, 0x0, 0x2}) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r6, 0x125f, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000140)={0x0, r5}) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) 15:13:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xe900, &(0x7f0000000640)) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xbf00, &(0x7f0000000640)) 15:13:26 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) 15:13:26 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xe901, &(0x7f0000000640)) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xbf01, &(0x7f0000000640)) 15:13:26 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x450100, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r1) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x4000, 0x0) write$cgroup_type(r4, &(0x7f00000000c0)='threaded\x00', 0x9) 15:13:26 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) 15:13:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xea00, &(0x7f0000000640)) 15:13:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:26 executing program 5: socketpair(0x1, 0x5, 0xc000, &(0x7f0000000640)) 15:13:26 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) 15:13:26 executing program 1: socketpair(0x1, 0x5, 0xea01, &(0x7f0000000640)) 15:13:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x0, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r0, 0x7b1, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:27 executing program 1: socketpair(0x1, 0x5, 0xeb00, &(0x7f0000000640)) 15:13:27 executing program 5: socketpair(0x1, 0x5, 0xc001, &(0x7f0000000640)) 15:13:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 1: socketpair(0x1, 0x5, 0xeb01, &(0x7f0000000640)) 15:13:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x0, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 5: socketpair(0x1, 0x5, 0xc100, &(0x7f0000000640)) 15:13:27 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x94a, @private0, 0x9}, r5}}, 0x30) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={0x0, 0x8000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 1: socketpair(0x1, 0x5, 0xec00, &(0x7f0000000640)) 15:13:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x0, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 5: socketpair(0x1, 0x5, 0xc101, &(0x7f0000000640)) 15:13:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:27 executing program 1: socketpair(0x1, 0x5, 0xec01, &(0x7f0000000640)) 15:13:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x0, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:27 executing program 1: socketpair(0x1, 0x5, 0xed00, &(0x7f0000000640)) 15:13:27 executing program 5: socketpair(0x1, 0x5, 0xc200, &(0x7f0000000640)) 15:13:27 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000080)={0xfffffffffffff233}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xc) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x0, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 5: socketpair(0x1, 0x5, 0xc201, &(0x7f0000000640)) 15:13:27 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) 15:13:27 executing program 1: socketpair(0x1, 0x5, 0xed01, &(0x7f0000000640)) 15:13:27 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) 15:13:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x0, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x8, 0x0, 0x10001}) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f00000000c0)={0x0, r0}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:27 executing program 5: socketpair(0x1, 0x5, 0xc300, &(0x7f0000000640)) 15:13:27 executing program 1: socketpair(0x1, 0x5, 0xee00, &(0x7f0000000640)) 15:13:27 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) 15:13:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x0, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:27 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:27 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000080)={0xffffffff}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000140)='/dev/dri/card#\x00') openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f00000005c0)={&(0x7f0000000180)={{@any, 0x9}, {@local, 0x8}, 0x400, "418bd623b935277300f54fee1883b0ddd1841d9d629744bff6ba68315e28559b2fcaa39e877ee6ff0df2909c300962952903b0ea812aa329f9d63f189cc9d1d36e7cbbd684653c597e603c41b025ab28603600aabf11a867b328521c9a7965060d68b9ca6a5cc7a0afa86ec4a624a36990b387e1663db9f996edd42a14fe28fdcc278b78be53e2ca2915f7c2404032cb44600645e6fe5dd8f730605d3c7241513a92686b14a65d5b9d3c907e44ed832ee491cbd6ea637b0c1f4b9c42030d25457c5fbd82cbc6799b090481a10c70226ec35faf3a0eb71589f576baf0bd6b9e0746c9db155f54620a8665eaf087ff432446034a79f7d7f97f5857464c1dce122a8a8d73e4077ff36d3894ebb5ca6f4a41e96e08ecedb101782585ae7ab7f5699887efd5f6c8ea2deec137e5c19da90118f8e8898131e6127b04d1db77ee107a388e64f429dbc510513a8b6d03ad37c654be6fd663c060128df774abcfc1795d7ff88e0cca7f10ee9e7b0dfefc7f059bff46b463ee3cc9aa64d7c361f9976cc300f05958643933c754cd2f27ffa1b40acd86c60983df30425085938776051c54430b426be51677379b40bf3139c1ae4359b4db001aaee360ebffe37f71cb3e7a0c3905d564f5b0802c94ac0d24029263d2787518f83f2f1883a9e38ae092c5ba0296ad63512bf7fbf69af7631b5a16e923edddea47e2f0e382055cb37892e53963cfb6d65740adbec43be22cfa3970cd16161d60befd59f4b770980055c65b67fa260696c45a77993d62cbfa004875cc14379e82a81dc93e06ed4d98a8f21193230abe8db6f0216626c86930d1ca168a7c47dffaa4d4556332bb4591be5eeea608e095939098e8d412834763c45372572f04162b6e62c4cfe458e43f5d25d5a1cacae953eb6c22c9b856675f9102f901ed03a043da8fdd5cc12b0c47c3c97288794a429c8ee81b8ac0b1c2d4389bb145b4790cec2af6bfdfeac393dccbb226b450c16ea66b7775830f936da826956fa80abfc1e63ca2afaa161a69d622222a8f2ffa03edd64b21f94198a1a5cb21c490fe629cf2495089cff227fb549f8d9b6823b55648feed404c80be95dbf86616141df49b8dc0bbbcb9de0fd8252f085fb64a76d39f2c8477f4febcf2390dc6e8ca2b5ad641a57c6f018fb41cbbb86ce77c13de12b4e1fd80d3c46bd73e20a73635d9265437858ee9a0bf7d0eb54da0dd411509bac40223c7c29cc6a6fb5b2ea8308f76e88180419a61f99831c21ab9bc0bde1fd90df3598fb2911c3ea5dc0626ee9ab3536b84d17f9dcd8932df4ea27c329051f8c91fa09f2e974d980ff5fb90c746e920a55deefaa981355c9296b2f9313d4386d66b3ae45d5bf8c28f5cd14d26fb05255ce23522da5bd3f5673f93596f98641826206f6a037745416978d62df816f50387cd078d727fd42018abe875089c"}, 0x418, 0xff}) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000680)={0x0, 0x101, 0x1, &(0x7f0000000640)=0x4}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x40) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0xab58}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000740)={&(0x7f0000000700)=[0xff, 0x0, 0xfffffffa, 0x7, 0x10000, 0x7], 0x6, 0x0, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000007c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000780), 0x1, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e23, 0x4, @loopback, 0xfda2}}}, 0xa0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000006c0)=0xaa, 0x4) 15:13:27 executing program 5: socketpair(0x1, 0x5, 0xc301, &(0x7f0000000640)) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xee01, &(0x7f0000000640)) 15:13:28 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x94a, @private0, 0x9}, r5}}, 0x30) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={0x0, 0x8000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x0, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc400, &(0x7f0000000640)) 15:13:28 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:28 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000080)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x2, 0x6}}, 0x20) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xef00, &(0x7f0000000640)) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x0, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x94a, @private0, 0x9}, r5}}, 0x30) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={0x0, 0x8000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc401, &(0x7f0000000640)) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xef01, &(0x7f0000000640)) 15:13:28 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 15:13:28 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x28842, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x294080, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x6d, 0x6, 0x3}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x68, &(0x7f0000000380)=[@in={0x2, 0x4e23, @private=0xa010101}, @in6={0xa, 0x4e24, 0x8000, @mcast2, 0x7}, @in={0x2, 0x4e22, @private=0xa010100}, @in6={0xa, 0x4e22, 0x4, @remote, 0x400}, @in={0x2, 0x4e21, @private=0x2a010100}]}, &(0x7f00000001c0)=0x10) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r2, 0x9}, &(0x7f0000000240)=0x8) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x6}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000480)={r6, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2}}, 0x3, 0x0, 0x9, 0xfa9, 0x872f}, &(0x7f0000000340)=0x98) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc500, &(0x7f0000000640)) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x94a, @private0, 0x9}, r5}}, 0x30) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={0x0, 0x8000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xf000, &(0x7f0000000640)) 15:13:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc501, &(0x7f0000000640)) 15:13:28 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000080)={0x0, 0x8}) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xf001, &(0x7f0000000640)) 15:13:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc600, &(0x7f0000000640)) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x2ee003, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xf100, &(0x7f0000000640)) 15:13:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0x7}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xf101, &(0x7f0000000640)) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc601, &(0x7f0000000640)) 15:13:28 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xf200, &(0x7f0000000640)) 15:13:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f00000000c0)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_DISCARD(r1, 0x1277, &(0x7f0000000080)=0x6) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc700, &(0x7f0000000640)) 15:13:28 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xf201, &(0x7f0000000640)) 15:13:28 executing program 5: socketpair(0x1, 0x5, 0xc701, &(0x7f0000000640)) 15:13:28 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:28 executing program 1: socketpair(0x1, 0x5, 0xf300, &(0x7f0000000640)) 15:13:29 executing program 3: ioctl$CHAR_RAW_GETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000380)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x1, 0x0, 0x10001}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f00000000c0)={0xdfffffff, r0}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r3, 0x7b1, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r3, 0x7ab, &(0x7f0000000800)={&(0x7f00000003c0)={{@any, 0x3}, {@host, 0x80000001}, 0x400, "67e0f79c578eee47203e9916c8c810764c564fb31144e599ba6247b0fdd2dbe0c18dba2914d72d64b34bcc5605a635c5ee779d77e45422c90f90a365a1fee6a4ec75e7b5758738ee5bcc326b5f1d8b37f42081f5b945a48b0f6623da9514f6df6eb876d5e7e9af39e1deed74521ffa00bf1a3c6c446548803e2670e349df4d998c0038b91659e8d286070523f241e9908465c6cb01e31486c64258699dfa4a14c2fc2d4a7a382b772e2591cde79362093f51e8ee101e7de032bdc0b78202b8458fc8499e5dd2814806fd956cd628cf5d740b7d06325d27435318ff05bc8bf241688a1f5440976cc7f24b47877087a520faa605794607ae31fc8011ec6a7b24c94e6e18113e25fa959133126831546fef4727cd47ee656579e1602ec3c8c8352856736fe507a2514dacba0b9525e8c3eb9eacf3f6dc0b54f908bf5876f0a67c987119c93b126ad9184bb29de84bc5f1173a3ba1d2873be37693d95d6602ba93160dfae9d891cdfe3038e1264f0ad8ef99636addd3a57c151b8b7f9c36dd2aabd9aca806b6f7742e38c0d9d3b0c3c886c3e5e4ba0590e3798ee8267701cc199204faac884b67a39e2ce652b62ace02f9fe579fd36599e355be8ba165a6d495e4e922013738161fb8dd0a48cf72ec76edaf84725cbc15f351f642b3889291976ecf77cdb75ea135bff490d2b5932bc7a791b06c301f3a488390e65833c92cd2d58174de7d1f6161aea0c11877a28d3bb387dc7bec89c12b6228a68771ebc700ee2f104362c68f4acab247680e204f646596df7bd86fd954101735f56b8c64db3868f2e6ba0fe5fcc7371eeb9fb825400a22bb0c56ed69d6099c222d17477ebf5658f831d8f860768304b42cf0252f1330e06c5cadfb1d7766b8927f912422e5b9b1261e94f1aad2e0c86658d6a2dd13f09a504a1fea0a1a3d3ec9643e75aea96c7238cc9a2f8cc9d2d55b1b91d71e575086247ba142900b2fae92092d4c3ec5e167b7cd75ba4e481c369d7815b7c6ce96a3035e6d7b9e5f9ff6037a2c1851390f7ab0bc2c7215fec6d7fe47d77ad47b28f2343e98b841b5bc8536e93c538e76db6a8eddb7ab5866c0b2b677261a5c8fdc15d25ccd8d3ede42e15e81cffaa5458042502619495c427369253bf34813975e633b8e4a9523b68d1dcb466dcbac42a5ce20fed01906461c02637c7cdb140afc330ef75f0116932dc4b830d709344a0a5991d31e9413646c9acf3495499bedaf9d80c578c65ec6ef6465e2f0b8ee643b8753db41b59e6fc513739e14b60de5d1585d1a1471fdfecbe987becfc74959ab61b41a853255e43288f1664c8a3aa0c1a7aed99e216b703f65aeb9829492b26d5d800e5433108e3b678fb85838242e5e45d294a01a366464a8b53aaff3e271a7424b091465efcc9860cfd72befe1d7fcf55f6ac2bc568f8daefe7648a394667f22"}, 0x418, 0x6}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000140)={0x0, 0xc8f}, &(0x7f00000001c0)=0x8) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000005f41e7d41a1050726c25fe104c73adef80baacd1d936ac5e9f51b4a1d48b360b2e554a313d5e78f6fd93fbd0cc8ea30587f77a751859ec34100848d0ca8da592203897425d9518afbff2891510cf8526db5d2410ca92547dd718bd46b2fa0c23952998ddb1f4e05ebafd2ece07047241d5d5f1132bd2d41c017eee9c424f919b61a6b305cda9b76b91692039aee8bb63eb674f24", @ANYRES16=0x0, @ANYBLOB="02002a00fc020000723895ef1a970000000000000000b90000000800040040000000c851abed829d113f3ff7a0e6b435573db464c077201f34941428"], 0x30}, 0x1, 0x0, 0x0, 0x4c890}, 0x58004) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xc800, &(0x7f0000000640)) 15:13:29 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x0, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf301, &(0x7f0000000640)) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xc801, &(0x7f0000000640)) 15:13:29 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x0, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xc900, &(0x7f0000000640)) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf400, &(0x7f0000000640)) 15:13:29 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={0x0, 0x6}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f00000000c0)={0x6}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x0, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xc901, &(0x7f0000000640)) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf401, &(0x7f0000000640)) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x3908c0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r1, 0x40081271, &(0x7f0000000080)=0xbaab) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r2, &(0x7f0000000140)={0x18, 0xb, 0x0, {0x3ff}}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xca00, &(0x7f0000000640)) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf500, &(0x7f0000000640)) 15:13:29 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x101000, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x100000000, 0x402800) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000100)={0x0, 0x1, 0x8, 0x0, 'syz0\x00', 0x7}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf501, &(0x7f0000000640)) 15:13:29 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x3908c0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r1, 0x40081271, &(0x7f0000000080)=0xbaab) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r2, &(0x7f0000000140)={0x18, 0xb, 0x0, {0x3ff}}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xca01, &(0x7f0000000640)) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x0, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xcb00, &(0x7f0000000640)) 15:13:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf600, &(0x7f0000000640)) 15:13:29 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000002680)={{0x3, 0x2, 0x6, 0xffffffff, 'syz0\x00', 0x45}, 0x1, 0x10000207, 0x7ff, 0x0, 0x6, 0x3, 'syz1\x00', &(0x7f00000023c0)=['\x00', '/dev/loop-control\x00', 'syz0\x00', '\x17%\x00', '{$]-&\x00', '\x00'], 0x22, [], [0x3, 0x0, 0x3f, 0x3f]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = getgid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000022c0)={0x90, 0x0, r0, {0x6, 0x1, 0x8, 0x7, 0x6, 0xb899, {0x0, 0x8, 0x8d, 0x6, 0x200, 0x2, 0xffffffff, 0x3, 0x2, 0x6000, 0xfff, r1, r3, 0x6a, 0x7fff}}}, 0x90) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000002500)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000002140)={{0x0, 0x5, 0x9, 0x20, 'syz0\x00', 0x20000}, 0x6, 0x200, 0x0, r2, 0x7, 0xffffffe1, 'syz1\x00', &(0x7f00000020c0)=['/dev/loop-control\x00', '\x17%\x00', '/dev/loop-control\x00', '/dev/loop-control\x00', '\x00', '/dev/loop-control\x00', '\x00'], 0x4d, [], [0xff6f, 0x68, 0xe7, 0x20]}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002280)) socket$can_raw(0x1d, 0x3, 0x1) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 15:13:29 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x101000, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x100000000, 0x402800) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000100)={0x0, 0x1, 0x8, 0x0, 'syz0\x00', 0x7}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xcb01, &(0x7f0000000640)) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x0, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf601, &(0x7f0000000640)) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x0, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 2: socketpair(0x1, 0x5, 0xf600, &(0x7f0000000640)) 15:13:29 executing program 5: socketpair(0x1, 0x5, 0xcc00, &(0x7f0000000640)) 15:13:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x0, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 3: getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 1: socketpair(0x1, 0x5, 0xf700, &(0x7f0000000640)) 15:13:29 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x0, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000500)={&(0x7f0000000000)=[0x80000000, 0x10001, 0x8001, 0x1ff], 0x4, 0x80800}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(0xffffffffffffffff, 0x7ab, &(0x7f00000004c0)={&(0x7f0000000080)={{@host, 0x7}, {@my=0x0, 0x144}, 0x400, "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"}, 0x418, 0x75bb}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xcc01, &(0x7f0000000640)) 15:13:30 executing program 1: socketpair(0x1, 0x5, 0xf701, &(0x7f0000000640)) 15:13:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x0, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xcd00, &(0x7f0000000640)) 15:13:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x5, 0x80) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000000c0)={0x4}) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 1: socketpair(0x1, 0x5, 0xf800, &(0x7f0000000640)) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xcd01, &(0x7f0000000640)) 15:13:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x480, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000240)={0x6, 0x7, 0x0, 0xffffffff, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) 15:13:30 executing program 1: socketpair(0x1, 0x5, 0xf801, &(0x7f0000000640)) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xce00, &(0x7f0000000640)) 15:13:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x0, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xce01, &(0x7f0000000640)) 15:13:30 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xfffffbff}) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x7fff, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x90, 0x301800) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000000c0)={0x3}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000040)={0x0, 0xffde}) 15:13:30 executing program 1: socketpair(0x1, 0x5, 0xf900, &(0x7f0000000640)) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xcf00, &(0x7f0000000640)) 15:13:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x480, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000240)={0x6, 0x7, 0x0, 0xffffffff, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x0, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:30 executing program 1: socketpair(0x1, 0x5, 0xf901, &(0x7f0000000640)) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xcf01, &(0x7f0000000640)) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0x0, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x0, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 1: socketpair(0x1, 0x5, 0xfa00, &(0x7f0000000640)) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xd000, &(0x7f0000000640)) 15:13:30 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0x67}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0x0, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x0, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 1: socketpair(0x1, 0x5, 0xfa01, &(0x7f0000000640)) 15:13:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:30 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x4}}, 0x18) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000100)=""/62) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x380000000000000, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 15:13:30 executing program 5: socketpair(0x1, 0x5, 0xd001, &(0x7f0000000640)) 15:13:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0x0, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfb00, &(0x7f0000000640)) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd100, &(0x7f0000000640)) 15:13:31 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x2, 0x2], 0x2, 0x0, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000100)={0xb13, 0x2}) 15:13:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x0, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfb01, &(0x7f0000000640)) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd101, &(0x7f0000000640)) 15:13:31 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000080)='/dev/raw/raw#\x00', 0x1, 0x4000) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) 15:13:31 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfc00, &(0x7f0000000640)) 15:13:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x0, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd200, &(0x7f0000000640)) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000080)={0xbd}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000180)) getuid() write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3, 0x9, {"2f56886d7d08fe8412418ebafb82c752"}, 0x4, 0x2, 0x5}}}, 0x90) 15:13:31 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfc01, &(0x7f0000000640)) 15:13:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x0, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd201, &(0x7f0000000640)) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 2: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x450100, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r1) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x4000, 0x0) write$cgroup_type(r4, &(0x7f00000000c0)='threaded\x00', 0x9) 15:13:31 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x3ff], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000003c0)={@local, 0x1}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_PBSZGET(r3, 0x127b, &(0x7f00000001c0)) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {r6, 0x9, "b90855", "21c3b07b1ac965d56ae82f311df35007a93409ea87051fd4652a1cf045ab6c47d3e1551a28616b0fa205ee1fb2a595584ff4cd691eae4b951856a6e47f88e839fbfec003529bb68bc057c11a080c38712973462b292f30395bfc09f1d5459ac33b77515ef8a433ec9e18d340d92ca4e6fdbb2314af4d2f995aa57d7aa7db5b90b1015dbb5c3b66d8b7b5078a5a9510ee2997cf8402852f341e0857e941c9d2da182108c2239d82dfceec55de968ffc6c50430d19dde18fb6a15738be4909b7115eeb81308422eb3ee3f89cb2abe5872ed774cfb0483b1af9acb2df2639156e6181c6aa0b1a70469ac50cfbc29273e0b21f73197223f3f36a007cc65d0024a831"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x9, @empty, 0x7fffffff}}}, 0xa0) 15:13:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x0, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd300, &(0x7f0000000640)) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfd00, &(0x7f0000000640)) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfd01, &(0x7f0000000640)) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x0, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd301, &(0x7f0000000640)) 15:13:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x0, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x4342, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x6, 0x5b7, 0x7, 0x3, 0xc3, 0x0, 0x9}, 0x9c) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfe00, &(0x7f0000000640)) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd400, &(0x7f0000000640)) 15:13:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x0, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd401, &(0x7f0000000640)) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x0, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) connect$packet(r0, &(0x7f0000000200)={0x11, 0x1b, r3, 0x1, 0xa5, 0x6, @local}, 0x14) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000080)={0x9}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = accept$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r6 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x8, 0x10800) ioctl$DRM_IOCTL_AGP_FREE(r6, 0x40206435, &(0x7f0000000100)) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000300)=@req={0x1, 0xa1f, 0x7fff, 0x81}, 0x10) r7 = socket$can_raw(0x1d, 0x3, 0x1) getpeername(r7, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000003c0)=0x80) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 15:13:31 executing program 1: socketpair(0x1, 0x5, 0xfe01, &(0x7f0000000640)) 15:13:31 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000013c0)={'wlan1\x00'}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x4) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000100)=""/220, 0xdc, 0x2, &(0x7f0000000280)={0x11, 0xf6, r2, 0x1, 0x8, 0x6, @multicast}, 0x14) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000040)={0x200000100, 0x0, 0x1}) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f00000004c0)={&(0x7f0000000480)=[0x3f, 0x1, 0x3], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$IOCTL_VMCI_VERSION2(r6, 0x7a7, &(0x7f0000000500)=0x80000) ioctl$DRM_IOCTL_AGP_FREE(r5, 0x40206435, &(0x7f00000002c0)={0x0, r4}) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000300)={0x0, 0xb6, 0x10}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000400)={r8, 0x80, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x4}, @in6={0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, @in6={0xa, 0x4e20, 0x7f, @ipv4={[], [], @remote}, 0x800}, @in6={0xa, 0x4e23, 0x3, @loopback, 0x101}, @in={0x2, 0x4e24, @remote}]}, &(0x7f0000000440)=0x10) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000000c0)={r4, 0x4}) 15:13:31 executing program 5: socketpair(0x1, 0x5, 0xd500, &(0x7f0000000640)) 15:13:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x0, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:31 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) connect$packet(r0, &(0x7f0000000200)={0x11, 0x1b, r3, 0x1, 0xa5, 0x6, @local}, 0x14) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000080)={0x9}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = accept$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r6 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x8, 0x10800) ioctl$DRM_IOCTL_AGP_FREE(r6, 0x40206435, &(0x7f0000000100)) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000300)=@req={0x1, 0xa1f, 0x7fff, 0x81}, 0x10) r7 = socket$can_raw(0x1d, 0x3, 0x1) getpeername(r7, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000003c0)=0x80) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 15:13:32 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x401, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f00000000c0)={0x3, r0}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0xff00, &(0x7f0000000640)) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd501, &(0x7f0000000640)) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0x0, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) connect$packet(r0, &(0x7f0000000200)={0x11, 0x1b, r3, 0x1, 0xa5, 0x6, @local}, 0x14) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000080)={0x9}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = accept$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r6 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x8, 0x10800) ioctl$DRM_IOCTL_AGP_FREE(r6, 0x40206435, &(0x7f0000000100)) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000300)=@req={0x1, 0xa1f, 0x7fff, 0x81}, 0x10) r7 = socket$can_raw(0x1d, 0x3, 0x1) getpeername(r7, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000003c0)=0x80) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 15:13:32 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000080), 0x4) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0xff01, &(0x7f0000000640)) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd600, &(0x7f0000000640)) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0x0, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0xffe0, &(0x7f0000000640)) 15:13:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0x0, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd601, &(0x7f0000000640)) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0x0, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0x20000, &(0x7f0000000640)) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd700, &(0x7f0000000640)) 15:13:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0x0, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x0, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd701, &(0x7f0000000640)) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0x200000, &(0x7f0000000640)) 15:13:32 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x2002, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x301000, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_FRASET(r1, 0x1264, &(0x7f0000000080)=0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x0, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0x0, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0x1000000, &(0x7f0000000640)) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd800, &(0x7f0000000640)) 15:13:32 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0x4}) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockname(r0, 0x0, &(0x7f00000000c0)) r1 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000180)={{0x8, 0x6, 0x2, 0x4, '\x00', 0xcd}, 0x4, 0x400, 0x4, r1, 0x3, 0x8, 'syz0\x00', &(0x7f0000000140)=['/dev/\x88oop-\f\xa3\xb9?\xe8\xa8l?', '[\x00', '%@/}\xf0{\x13\x00'], 0x1c, [], [0x4, 0xa9, 0x20, 0x3]}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000340)={0x5, &(0x7f0000000300)=[{0x1f, 0x7, 0x1, 0x9b}, {0x1, 0xe9, 0xff, 0x1}, {0x400, 0x3f, 0x8, 0x803}, {0x3, 0x9, 0x1, 0x800}, {0x4, 0x5, 0x88, 0x4}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x101, @private0={0xfc, 0x0, [], 0x1}, 0x10001}, {0xa, 0x4e20, 0x80000001, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8}, 0xffffffffffffffff, 0x6}}, 0x48) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, 0x0, 0x0) r6 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000440)={{0x2, 0x2, 0x7, 0xffff, '\x00', 0x1000}, 0x3, 0x0, 0x8, r6, 0x5, 0xfffffff9, 'syz0\x00', &(0x7f0000000400)=['\'$#[-[\x00', 'syz0\x00', '][\x00', '/dev/nvram\x00', '%@/}\xf0{\x13\x00'], 0x22, [], [0x0, 0x81, 0x1, 0x80]}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000380)={0xffff, 0x0, 0x10001}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f00000003c0)={0x794, r7}) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x0, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x0, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0x1010000, &(0x7f0000000640)) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd801, &(0x7f0000000640)) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0x0, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x0, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x10001, 0xc4100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xff], 0x1, 0x180800, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 5: socketpair(0x1, 0x5, 0xd900, &(0x7f0000000640)) 15:13:32 executing program 1: socketpair(0x1, 0x5, 0x2000000, &(0x7f0000000640)) 15:13:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x8000, 0x7, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0x0, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x0, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0x0, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x8000, @private2={0xfc, 0x2, [], 0x1}, 0x7}, r2}}, 0x30) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @rand_addr=0x64010102}}, 0x1e) 15:13:33 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:33 executing program 1: socketpair(0x1, 0x5, 0x2010000, &(0x7f0000000640)) 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xd901, &(0x7f0000000640)) 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xda00, &(0x7f0000000640)) 15:13:33 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x80, 0x102) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r1, 0x7b1, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r1, 0x7a4, &(0x7f0000000100)={{@host, 0x1f}, 0x1000, 0x5, 0x6, 0xffffffff}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f00000000c0)={0x0, 0x11f451d}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 15:13:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0x0, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 1: socketpair(0x1, 0x5, 0x3000000, &(0x7f0000000640)) [ 2926.195971] FAULT_INJECTION: forcing a failure. [ 2926.195971] name failslab, interval 1, probability 0, space 0, times 0 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xda01, &(0x7f0000000640)) 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xdb00, &(0x7f0000000640)) [ 2926.239539] CPU: 1 PID: 31246 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2926.247487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2926.256852] Call Trace: [ 2926.259465] dump_stack+0x1fc/0x2ef [ 2926.263103] should_fail.cold+0xa/0xf [ 2926.266915] ? setup_fault_attr+0x200/0x200 [ 2926.271274] ? lock_acquire+0x170/0x3c0 [ 2926.275274] __should_failslab+0x115/0x180 [ 2926.280396] should_failslab+0x5/0x10 [ 2926.284207] kmem_cache_alloc_trace+0x284/0x380 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xdb01, &(0x7f0000000640)) [ 2926.288888] ? loop_queue_work+0x20c0/0x20c0 [ 2926.293313] loop_add+0x4e/0x8a0 [ 2926.296700] loop_control_ioctl+0x16c/0x480 [ 2926.301031] ? loop_lookup+0x1d0/0x1d0 [ 2926.304932] ? ksys_write+0x241/0x2a0 [ 2926.308751] ? loop_lookup+0x1d0/0x1d0 [ 2926.312660] do_vfs_ioctl+0xcdb/0x12e0 [ 2926.316567] ? lock_downgrade+0x720/0x720 [ 2926.320728] ? check_preemption_disabled+0x41/0x280 [ 2926.325768] ? ioctl_preallocate+0x200/0x200 [ 2926.330231] ? __fget+0x356/0x510 [ 2926.333697] ? do_dup2+0x450/0x450 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xdc00, &(0x7f0000000640)) [ 2926.337271] ? vfs_write+0x393/0x540 [ 2926.341013] ? fput+0x2b/0x190 [ 2926.344235] ksys_ioctl+0x9b/0xc0 [ 2926.347710] __x64_sys_ioctl+0x6f/0xb0 [ 2926.351609] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2926.356205] do_syscall_64+0xf9/0x620 [ 2926.360035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2926.365238] RIP: 0033:0x465ef9 [ 2926.368438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2926.387353] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2926.395072] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2926.402354] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2926.409718] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2926.417004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2926.424373] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:33 executing program 2 (fault-call:1 fault-nth:1): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xdc01, &(0x7f0000000640)) 15:13:33 executing program 1: socketpair(0x1, 0x5, 0x3010000, &(0x7f0000000640)) 15:13:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0x0, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x5, 0x30}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x679c, 0x100}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={r3, 0x1, 0xf087, 0xffff8001}, &(0x7f0000000200)=0x10) 15:13:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2926.580407] FAULT_INJECTION: forcing a failure. [ 2926.580407] name failslab, interval 1, probability 0, space 0, times 0 [ 2926.606207] CPU: 0 PID: 31275 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2926.614144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2926.623504] Call Trace: [ 2926.626111] dump_stack+0x1fc/0x2ef [ 2926.629748] should_fail.cold+0xa/0xf [ 2926.633557] ? setup_fault_attr+0x200/0x200 [ 2926.638051] ? lock_acquire+0x170/0x3c0 [ 2926.642152] __should_failslab+0x115/0x180 [ 2926.646394] should_failslab+0x5/0x10 [ 2926.650196] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2926.655303] __kmalloc_node+0x38/0x70 [ 2926.659119] blk_mq_alloc_tag_set+0x330/0xa30 [ 2926.663622] loop_add+0x26d/0x8a0 [ 2926.667081] loop_control_ioctl+0x16c/0x480 [ 2926.671401] ? loop_lookup+0x1d0/0x1d0 [ 2926.675293] ? ksys_write+0x241/0x2a0 [ 2926.679093] ? loop_lookup+0x1d0/0x1d0 [ 2926.683436] do_vfs_ioctl+0xcdb/0x12e0 [ 2926.687801] ? lock_downgrade+0x720/0x720 [ 2926.692149] ? check_preemption_disabled+0x41/0x280 [ 2926.697550] ? ioctl_preallocate+0x200/0x200 [ 2926.701989] ? __fget+0x356/0x510 [ 2926.705710] ? do_dup2+0x450/0x450 [ 2926.709291] ? vfs_write+0x393/0x540 [ 2926.712997] ? fput+0x2b/0x190 [ 2926.716838] ksys_ioctl+0x9b/0xc0 [ 2926.720296] __x64_sys_ioctl+0x6f/0xb0 [ 2926.724180] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2926.728868] do_syscall_64+0xf9/0x620 [ 2926.732668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2926.737874] RIP: 0033:0x465ef9 [ 2926.741060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2926.760063] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2926.767875] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xdd00, &(0x7f0000000640)) 15:13:33 executing program 1: socketpair(0x1, 0x5, 0x4000000, &(0x7f0000000640)) 15:13:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0x0, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0x0, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2926.775154] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2926.782681] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2926.789970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2926.797384] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:33 executing program 2 (fault-call:1 fault-nth:2): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xdd01, &(0x7f0000000640)) 15:13:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0x0, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:33 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0x9}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x2f}, 0x4}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e22, @multicast1}}, 0xf0b5eb4f, 0x2, 0x401, 0xff, 0x52, 0x5, 0x9}, 0x9c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000000c0)={0x0, 0x40}) 15:13:33 executing program 1: socketpair(0x1, 0x5, 0x4010000, &(0x7f0000000640)) 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xde00, &(0x7f0000000640)) [ 2926.979455] FAULT_INJECTION: forcing a failure. [ 2926.979455] name failslab, interval 1, probability 0, space 0, times 0 [ 2927.007684] CPU: 1 PID: 31292 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2927.016238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2927.025597] Call Trace: 15:13:33 executing program 5: socketpair(0x1, 0x5, 0xde01, &(0x7f0000000640)) 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xdf00, &(0x7f0000000640)) [ 2927.028206] dump_stack+0x1fc/0x2ef [ 2927.031848] should_fail.cold+0xa/0xf [ 2927.035695] ? setup_fault_attr+0x200/0x200 [ 2927.040030] ? lock_acquire+0x170/0x3c0 [ 2927.044054] __should_failslab+0x115/0x180 [ 2927.048312] should_failslab+0x5/0x10 [ 2927.052121] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2927.057235] __kmalloc_node+0x38/0x70 [ 2927.061051] blk_mq_alloc_tag_set+0x3c2/0xa30 [ 2927.065567] loop_add+0x26d/0x8a0 [ 2927.069046] loop_control_ioctl+0x16c/0x480 [ 2927.073382] ? loop_lookup+0x1d0/0x1d0 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xdf01, &(0x7f0000000640)) 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xe000, &(0x7f0000000640)) [ 2927.077288] ? ksys_write+0x241/0x2a0 [ 2927.081097] ? loop_lookup+0x1d0/0x1d0 [ 2927.084993] do_vfs_ioctl+0xcdb/0x12e0 [ 2927.089069] ? lock_downgrade+0x720/0x720 [ 2927.093231] ? check_preemption_disabled+0x41/0x280 [ 2927.098355] ? ioctl_preallocate+0x200/0x200 [ 2927.102785] ? __fget+0x356/0x510 [ 2927.106276] ? do_dup2+0x450/0x450 [ 2927.109825] ? vfs_write+0x393/0x540 [ 2927.113550] ? fput+0x2b/0x190 [ 2927.116847] ksys_ioctl+0x9b/0xc0 [ 2927.120394] __x64_sys_ioctl+0x6f/0xb0 [ 2927.124296] ? lockdep_hardirqs_on+0x3a8/0x5c0 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xe001, &(0x7f0000000640)) [ 2927.128889] do_syscall_64+0xf9/0x620 [ 2927.132705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2927.137904] RIP: 0033:0x465ef9 [ 2927.141117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2927.160030] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2927.167911] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2927.175202] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2927.183602] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2927.191485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2927.198946] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:34 executing program 2 (fault-call:1 fault-nth:3): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xe100, &(0x7f0000000640)) 15:13:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0x0, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:34 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xfad9}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:34 executing program 1: socketpair(0x1, 0x5, 0x5000000, &(0x7f0000000640)) [ 2927.374806] FAULT_INJECTION: forcing a failure. [ 2927.374806] name failslab, interval 1, probability 0, space 0, times 0 [ 2927.412342] CPU: 1 PID: 31329 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xe101, &(0x7f0000000640)) 15:13:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0x0, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2927.420354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2927.429893] Call Trace: [ 2927.432498] dump_stack+0x1fc/0x2ef [ 2927.436139] should_fail.cold+0xa/0xf [ 2927.439955] ? setup_fault_attr+0x200/0x200 [ 2927.444285] ? lock_acquire+0x170/0x3c0 [ 2927.448280] __should_failslab+0x115/0x180 [ 2927.452533] should_failslab+0x5/0x10 [ 2927.456348] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2927.461560] blk_mq_init_tags+0x6a/0x2b0 [ 2927.465721] blk_mq_alloc_rq_map+0x9d/0x230 [ 2927.470145] __blk_mq_alloc_rq_map+0xa3/0x3b0 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xe200, &(0x7f0000000640)) [ 2927.474759] blk_mq_alloc_tag_set+0x589/0xa30 [ 2927.479363] loop_add+0x26d/0x8a0 [ 2927.482838] loop_control_ioctl+0x16c/0x480 [ 2927.487178] ? loop_lookup+0x1d0/0x1d0 [ 2927.491083] ? ksys_write+0x241/0x2a0 [ 2927.494919] ? loop_lookup+0x1d0/0x1d0 [ 2927.498822] do_vfs_ioctl+0xcdb/0x12e0 [ 2927.502719] ? lock_downgrade+0x720/0x720 [ 2927.506962] ? check_preemption_disabled+0x41/0x280 [ 2927.511989] ? ioctl_preallocate+0x200/0x200 [ 2927.516590] ? __fget+0x356/0x510 [ 2927.520065] ? do_dup2+0x450/0x450 [ 2927.524052] ? vfs_write+0x393/0x540 [ 2927.527778] ? fput+0x2b/0x190 [ 2927.530987] ksys_ioctl+0x9b/0xc0 [ 2927.534457] __x64_sys_ioctl+0x6f/0xb0 [ 2927.538348] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2927.542940] do_syscall_64+0xf9/0x620 [ 2927.546745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2927.552036] RIP: 0033:0x465ef9 [ 2927.555215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:13:34 executing program 1: socketpair(0x1, 0x5, 0x5010000, &(0x7f0000000640)) 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xe201, &(0x7f0000000640)) [ 2927.574245] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2927.582001] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2927.589276] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2927.596548] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2927.603821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2927.611095] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:34 executing program 2 (fault-call:1 fault-nth:4): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) [ 2927.653708] blk-mq: reduced tag depth (128 -> 64) 15:13:34 executing program 1: socketpair(0x1, 0x5, 0x6000000, &(0x7f0000000640)) 15:13:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x0, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:34 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x12200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2927.741551] FAULT_INJECTION: forcing a failure. [ 2927.741551] name failslab, interval 1, probability 0, space 0, times 0 [ 2927.780146] CPU: 1 PID: 31354 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2927.788080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2927.797532] Call Trace: [ 2927.800256] dump_stack+0x1fc/0x2ef [ 2927.803984] should_fail.cold+0xa/0xf [ 2927.807809] ? setup_fault_attr+0x200/0x200 [ 2927.812140] ? lock_acquire+0x170/0x3c0 [ 2927.817018] __should_failslab+0x115/0x180 [ 2927.821266] should_failslab+0x5/0x10 [ 2927.825098] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2927.830742] __kmalloc_node+0x38/0x70 [ 2927.834569] sbitmap_init_node+0x123/0x440 [ 2927.838937] sbitmap_queue_init_node+0x37/0x6c0 [ 2927.843636] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2927.848686] blk_mq_init_tags+0x10d/0x2b0 [ 2927.853004] blk_mq_alloc_rq_map+0x9d/0x230 [ 2927.857350] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 2927.861864] blk_mq_alloc_tag_set+0x589/0xa30 [ 2927.866590] loop_add+0x26d/0x8a0 [ 2927.870057] loop_control_ioctl+0x16c/0x480 [ 2927.874370] ? loop_lookup+0x1d0/0x1d0 [ 2927.878257] ? ksys_write+0x241/0x2a0 [ 2927.882048] ? loop_lookup+0x1d0/0x1d0 [ 2927.885944] do_vfs_ioctl+0xcdb/0x12e0 [ 2927.889960] ? lock_downgrade+0x720/0x720 [ 2927.894112] ? check_preemption_disabled+0x41/0x280 [ 2927.899121] ? ioctl_preallocate+0x200/0x200 [ 2927.903624] ? __fget+0x356/0x510 [ 2927.907104] ? do_dup2+0x450/0x450 [ 2927.910637] ? vfs_write+0x393/0x540 [ 2927.914352] ? fput+0x2b/0x190 [ 2927.917563] ksys_ioctl+0x9b/0xc0 [ 2927.921029] __x64_sys_ioctl+0x6f/0xb0 [ 2927.924931] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2927.929503] do_syscall_64+0xf9/0x620 [ 2927.933305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2927.938489] RIP: 0033:0x465ef9 15:13:34 executing program 5: socketpair(0x1, 0x5, 0xe300, &(0x7f0000000640)) 15:13:34 executing program 1: socketpair(0x1, 0x5, 0x6010000, &(0x7f0000000640)) [ 2927.941675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2927.960837] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2927.968625] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2927.975897] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2927.983171] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 15:13:34 executing program 3: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:34 executing program 1: socketpair(0x1, 0x5, 0x7000000, &(0x7f0000000640)) [ 2927.990453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2927.997734] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:35 executing program 2 (fault-call:1 fault-nth:5): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe301, &(0x7f0000000640)) [ 2928.076238] blk-mq: reduced tag depth (128 -> 64) 15:13:35 executing program 1: socketpair(0x1, 0x5, 0x7010000, &(0x7f0000000640)) 15:13:35 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe400, &(0x7f0000000640)) 15:13:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x0, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:35 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0xffff2b03, 0x10001, 0x0, 0x1, 0x7fffffff, 0x3, 0x100, 0xaa, 0x6], 0x9, 0x80800, 0x0, 0xffffffffffffffff}) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 2928.237853] FAULT_INJECTION: forcing a failure. [ 2928.237853] name failslab, interval 1, probability 0, space 0, times 0 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe401, &(0x7f0000000640)) [ 2928.291297] CPU: 0 PID: 31385 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2928.299236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2928.308602] Call Trace: [ 2928.311211] dump_stack+0x1fc/0x2ef [ 2928.314853] should_fail.cold+0xa/0xf [ 2928.318668] ? setup_fault_attr+0x200/0x200 [ 2928.323001] ? lock_acquire+0x170/0x3c0 [ 2928.327035] __should_failslab+0x115/0x180 [ 2928.331289] should_failslab+0x5/0x10 [ 2928.335543] kmem_cache_alloc_node_trace+0x244/0x3b0 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe500, &(0x7f0000000640)) [ 2928.340671] sbitmap_queue_init_node+0x240/0x6c0 [ 2928.345455] blk_mq_init_tags+0x10d/0x2b0 [ 2928.350575] blk_mq_alloc_rq_map+0x9d/0x230 [ 2928.355089] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 2928.359693] blk_mq_alloc_tag_set+0x589/0xa30 [ 2928.364218] loop_add+0x26d/0x8a0 [ 2928.367689] loop_control_ioctl+0x16c/0x480 [ 2928.372024] ? loop_lookup+0x1d0/0x1d0 [ 2928.375928] ? ksys_write+0x241/0x2a0 [ 2928.380085] ? loop_lookup+0x1d0/0x1d0 [ 2928.383981] do_vfs_ioctl+0xcdb/0x12e0 [ 2928.387869] ? lock_downgrade+0x720/0x720 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe501, &(0x7f0000000640)) [ 2928.392011] ? check_preemption_disabled+0x41/0x280 [ 2928.397038] ? ioctl_preallocate+0x200/0x200 [ 2928.401460] ? __fget+0x356/0x510 [ 2928.404927] ? do_dup2+0x450/0x450 [ 2928.408473] ? vfs_write+0x393/0x540 [ 2928.412218] ? fput+0x2b/0x190 [ 2928.415428] ksys_ioctl+0x9b/0xc0 [ 2928.418907] __x64_sys_ioctl+0x6f/0xb0 [ 2928.422823] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2928.427418] do_syscall_64+0xf9/0x620 [ 2928.431231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2928.436436] RIP: 0033:0x465ef9 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe600, &(0x7f0000000640)) [ 2928.439635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2928.458727] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2928.466541] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2928.474341] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2928.482770] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 15:13:35 executing program 2 (fault-call:1 fault-nth:6): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:35 executing program 1: socketpair(0x1, 0x5, 0x8000000, &(0x7f0000000640)) [ 2928.490049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2928.497327] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 [ 2928.516201] blk-mq: reduced tag depth (128 -> 64) 15:13:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x0, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe601, &(0x7f0000000640)) 15:13:35 executing program 1: socketpair(0x1, 0x5, 0x8010000, &(0x7f0000000640)) [ 2928.684226] FAULT_INJECTION: forcing a failure. [ 2928.684226] name failslab, interval 1, probability 0, space 0, times 0 [ 2928.727095] CPU: 1 PID: 31420 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2928.735113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2928.744483] Call Trace: [ 2928.747113] dump_stack+0x1fc/0x2ef [ 2928.750760] should_fail.cold+0xa/0xf [ 2928.754585] ? setup_fault_attr+0x200/0x200 [ 2928.758925] ? lock_acquire+0x170/0x3c0 [ 2928.762925] __should_failslab+0x115/0x180 [ 2928.767179] should_failslab+0x5/0x10 [ 2928.770995] kmem_cache_alloc_node_trace+0x244/0x3b0 15:13:35 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) socket$inet(0x2, 0x800, 0x3) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_PBSZGET(r1, 0x127b, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xffffffffffffff99, "8d9937bcdf111fefe37f21af8e7ccd9b938a548330eefdaa82c31d2c49387ec0a49d5bd1bf3f44e14b70610d15de658a5789ac5c8e02cb66195c0bf6441a80f5e0478375a4e257cc30eb6a23ddc5888063f41b924608a2fb328a653996c3c0748287d9b1a47cbd153ae6b7101f9390ececfea8c890cdb392bd9b34d30f845fa08f60b99b6aacfd2f3b86c03cfbfd19a12e61c67faef961651b95172ad10cb2f973b6d5f5fe220d4b512597e9cf7776fbeded8609ee2bcec28ea321146a4e011500ef196ef73ecd3c9b7631ac23ad0604e8a5cf6df8"}, &(0x7f0000000300)=0xdd) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000340)={r3, 0x3a0, 0x7fffffff, 0x556}, &(0x7f0000000380)=0x10) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x95, "93b5e99a161bc9d92fdcd8815f8e9d7c3d80a2ff7d843a67ae597156c27969a97eebb09538e7e44e2f79c26fa29f099b87510bcf6b55af6dcb4c841fa14e5a7e72de0b11e6a5464aa1ab7f61eff4b631e825ae4956f5ad46e06ca91c4fe6dd6cc115b00ab306eb0b937c6c137fbde6f3ed6721c0c836ecf9084eaf890d3f3d6795476eb6a2d3a428a83fed6a0d8f319a2775648194"}, &(0x7f0000000140)=0x9d) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r4, 0x7fff, 0x20}, &(0x7f00000001c0)=0xc) 15:13:35 executing program 1: socketpair(0x1, 0x5, 0x9000000, &(0x7f0000000640)) [ 2928.776141] sbitmap_queue_init_node+0x240/0x6c0 [ 2928.781986] blk_mq_init_tags+0x16f/0x2b0 [ 2928.786213] blk_mq_alloc_rq_map+0x9d/0x230 [ 2928.790558] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 2928.795603] blk_mq_alloc_tag_set+0x589/0xa30 [ 2928.800122] loop_add+0x26d/0x8a0 [ 2928.803589] loop_control_ioctl+0x16c/0x480 [ 2928.807923] ? loop_lookup+0x1d0/0x1d0 [ 2928.811829] ? ksys_write+0x241/0x2a0 [ 2928.815652] ? loop_lookup+0x1d0/0x1d0 [ 2928.819904] do_vfs_ioctl+0xcdb/0x12e0 15:13:35 executing program 1: socketpair(0x1, 0x5, 0x9010000, &(0x7f0000000640)) [ 2928.823807] ? lock_downgrade+0x720/0x720 [ 2928.827967] ? check_preemption_disabled+0x41/0x280 [ 2928.833010] ? ioctl_preallocate+0x200/0x200 [ 2928.837435] ? __fget+0x356/0x510 [ 2928.840929] ? do_dup2+0x450/0x450 [ 2928.844478] ? vfs_write+0x393/0x540 [ 2928.848208] ? fput+0x2b/0x190 [ 2928.851427] ksys_ioctl+0x9b/0xc0 [ 2928.854911] __x64_sys_ioctl+0x6f/0xb0 [ 2928.858843] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2928.863467] do_syscall_64+0xf9/0x620 [ 2928.867437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2928.872639] RIP: 0033:0x465ef9 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe700, &(0x7f0000000640)) 15:13:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2928.875844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2928.894763] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2928.902622] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2928.909992] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2928.917368] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 15:13:35 executing program 2 (fault-call:1 fault-nth:7): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:35 executing program 5: socketpair(0x1, 0x5, 0xe701, &(0x7f0000000640)) 15:13:35 executing program 1: socketpair(0x1, 0x5, 0xa000000, &(0x7f0000000640)) [ 2928.924630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2928.931921] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 [ 2928.966474] blk-mq: reduced tag depth (128 -> 64) 15:13:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x0, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:36 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x800, 0xa800) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000000c0)={{0x3, 0x3, 0x5, 0x7, 'syz0\x00', 0x3}, 0x1, [0x100, 0x800, 0x0, 0x1, 0x7, 0x3f, 0x0, 0x36, 0x4, 0x6, 0x3ff, 0x7f, 0x2, 0xffffffff, 0x2, 0x7, 0x5, 0x6, 0x9, 0x4, 0x6, 0x1f, 0x3, 0x1, 0x7, 0x6, 0x80, 0x5, 0x0, 0x7ff, 0x10001, 0x8, 0x9, 0x4, 0x800, 0x52e, 0x9, 0x6, 0x55db18f, 0x7, 0x5, 0x5, 0x5, 0x10000, 0x1, 0xc10, 0xffffffff, 0x6, 0x9, 0x8, 0x2, 0x861a, 0x7b, 0x5, 0x6, 0xff, 0x1, 0x3ff, 0x5, 0xf1, 0x4, 0x947, 0x5, 0x1, 0x8, 0x200, 0x4, 0x1, 0x6, 0x6, 0x7, 0x1, 0x5, 0x9, 0x100000001, 0x1ff, 0xfffffffffffffffa, 0x4, 0x1, 0x91b, 0x100000000, 0x7, 0x3, 0xfffffffffffff3ad, 0x40, 0xb3, 0x31b0fbb0, 0x80, 0x81, 0x3ff, 0xe367, 0xae, 0x0, 0x3, 0xffff, 0x9, 0xa2, 0x4, 0x2, 0x0, 0x0, 0x5d3, 0x0, 0x10000, 0x9, 0xffffffffffffff5f, 0x487f, 0x2b95, 0x2, 0x100, 0x0, 0x100000001, 0x101, 0x444, 0x80000000, 0x4, 0x34, 0x800, 0x3, 0x100000001, 0x6, 0x9, 0xffffffffffffffc1, 0x4, 0x1, 0x0, 0x6, 0x6]}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xa010000, &(0x7f0000000640)) 15:13:36 executing program 5: socketpair(0x1, 0x5, 0xe800, &(0x7f0000000640)) [ 2929.136647] FAULT_INJECTION: forcing a failure. [ 2929.136647] name failslab, interval 1, probability 0, space 0, times 0 [ 2929.171866] CPU: 1 PID: 31453 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xb000000, &(0x7f0000000640)) [ 2929.179796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2929.189171] Call Trace: [ 2929.191776] dump_stack+0x1fc/0x2ef [ 2929.195438] should_fail.cold+0xa/0xf [ 2929.199256] ? setup_fault_attr+0x200/0x200 [ 2929.203593] ? __lockdep_init_map+0x100/0x5a0 [ 2929.208139] __should_failslab+0x115/0x180 [ 2929.212388] should_failslab+0x5/0x10 [ 2929.216219] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2929.221871] __kmalloc_node+0x38/0x70 [ 2929.225694] blk_mq_alloc_rq_map+0xdf/0x230 [ 2929.230044] __blk_mq_alloc_rq_map+0xa3/0x3b0 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xb010000, &(0x7f0000000640)) [ 2929.234563] blk_mq_alloc_tag_set+0x589/0xa30 [ 2929.239095] loop_add+0x26d/0x8a0 [ 2929.242562] loop_control_ioctl+0x16c/0x480 [ 2929.246906] ? loop_lookup+0x1d0/0x1d0 [ 2929.250816] ? ksys_write+0x241/0x2a0 [ 2929.254638] ? loop_lookup+0x1d0/0x1d0 [ 2929.258715] do_vfs_ioctl+0xcdb/0x12e0 [ 2929.262618] ? lock_downgrade+0x720/0x720 [ 2929.266777] ? check_preemption_disabled+0x41/0x280 [ 2929.271803] ? ioctl_preallocate+0x200/0x200 [ 2929.276256] ? __fget+0x356/0x510 [ 2929.279730] ? do_dup2+0x450/0x450 [ 2929.283285] ? vfs_write+0x393/0x540 15:13:36 executing program 5: socketpair(0x1, 0x5, 0xe801, &(0x7f0000000640)) 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xc000000, &(0x7f0000000640)) [ 2929.287014] ? fput+0x2b/0x190 [ 2929.290239] ksys_ioctl+0x9b/0xc0 [ 2929.293705] __x64_sys_ioctl+0x6f/0xb0 [ 2929.297611] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2929.302203] do_syscall_64+0xf9/0x620 [ 2929.306016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2929.311216] RIP: 0033:0x465ef9 [ 2929.314423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2929.333423] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2929.341193] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2929.348473] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2929.355769] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2929.363072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2929.370620] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 [ 2929.399974] blk-mq: reduced tag depth (128 -> 64) 15:13:36 executing program 2 (fault-call:1 fault-nth:8): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xc010000, &(0x7f0000000640)) 15:13:36 executing program 5: socketpair(0x1, 0x5, 0xe900, &(0x7f0000000640)) 15:13:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x0, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:36 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7, 0x101000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x3c, &(0x7f0000000080)=[@in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e21, 0x1, @remote, 0x5}, @in={0x2, 0x4e20, @multicast2}]}, &(0x7f0000000100)=0x10) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000140)={r2}, 0x8) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 15:13:36 executing program 5: socketpair(0x1, 0x5, 0xe901, &(0x7f0000000640)) [ 2929.552732] FAULT_INJECTION: forcing a failure. [ 2929.552732] name failslab, interval 1, probability 0, space 0, times 0 [ 2929.597356] CPU: 0 PID: 31482 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2929.605524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2929.614890] Call Trace: [ 2929.617514] dump_stack+0x1fc/0x2ef [ 2929.621154] should_fail.cold+0xa/0xf [ 2929.624973] ? setup_fault_attr+0x200/0x200 [ 2929.629309] ? __lockdep_init_map+0x100/0x5a0 [ 2929.633821] __should_failslab+0x115/0x180 [ 2929.638070] should_failslab+0x5/0x10 [ 2929.641886] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2929.647009] __kmalloc_node+0x38/0x70 [ 2929.650830] blk_mq_alloc_rq_map+0x120/0x230 [ 2929.655252] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 2929.659758] blk_mq_alloc_tag_set+0x589/0xa30 [ 2929.664272] loop_add+0x26d/0x8a0 [ 2929.667739] loop_control_ioctl+0x16c/0x480 [ 2929.672072] ? loop_lookup+0x1d0/0x1d0 [ 2929.675981] ? ksys_write+0x241/0x2a0 [ 2929.679813] ? loop_lookup+0x1d0/0x1d0 [ 2929.683729] do_vfs_ioctl+0xcdb/0x12e0 [ 2929.687933] ? lock_downgrade+0x720/0x720 [ 2929.692092] ? check_preemption_disabled+0x41/0x280 [ 2929.697200] ? ioctl_preallocate+0x200/0x200 [ 2929.701647] ? __fget+0x356/0x510 [ 2929.705120] ? do_dup2+0x450/0x450 [ 2929.708679] ? vfs_write+0x393/0x540 [ 2929.712401] ? fput+0x2b/0x190 [ 2929.715600] ksys_ioctl+0x9b/0xc0 [ 2929.719077] __x64_sys_ioctl+0x6f/0xb0 [ 2929.722975] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2929.727566] do_syscall_64+0xf9/0x620 [ 2929.731372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2929.736568] RIP: 0033:0x465ef9 15:13:36 executing program 5: socketpair(0x1, 0x5, 0xea00, &(0x7f0000000640)) 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xd000000, &(0x7f0000000640)) [ 2929.739935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2929.758839] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2929.767426] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2929.774715] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2929.782008] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2929.789294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 15:13:36 executing program 2 (fault-call:1 fault-nth:9): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) [ 2929.796570] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 [ 2929.811081] blk-mq: reduced tag depth (128 -> 64) 15:13:36 executing program 5: socketpair(0x1, 0x5, 0xea01, &(0x7f0000000640)) 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xd010000, &(0x7f0000000640)) 15:13:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x0, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:36 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x601, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080), 0x0, 0x800, 0x0, 0xffffffffffffffff}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0xfe80, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000840)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"df3fb449e842114af4bb72dbb72b974c"}}}}, 0xa0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x100000001, 0x0, 0x2}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={[], [], @multicast2}, 0x8}, r3}}, 0x30) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x0, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2929.957083] FAULT_INJECTION: forcing a failure. [ 2929.957083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2930.001198] CPU: 0 PID: 31505 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2930.009126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2930.018491] Call Trace: [ 2930.021111] dump_stack+0x1fc/0x2ef [ 2930.025470] should_fail.cold+0xa/0xf [ 2930.029454] ? setup_fault_attr+0x200/0x200 [ 2930.033794] __alloc_pages_nodemask+0x239/0x2890 [ 2930.038563] ? kasan_kmalloc+0x139/0x160 [ 2930.042641] ? __kmalloc_node+0x4c/0x70 [ 2930.046630] ? blk_mq_alloc_rq_map+0x120/0x230 15:13:36 executing program 1: socketpair(0x1, 0x5, 0xe000000, &(0x7f0000000640)) 15:13:37 executing program 1: socketpair(0x1, 0x5, 0xe010000, &(0x7f0000000640)) [ 2930.051227] ? __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 2930.056000] ? blk_mq_alloc_tag_set+0x589/0xa30 [ 2930.060763] ? loop_add+0x26d/0x8a0 [ 2930.064422] ? loop_control_ioctl+0x16c/0x480 [ 2930.068931] ? do_vfs_ioctl+0xcdb/0x12e0 [ 2930.073000] ? do_syscall_64+0xf9/0x620 [ 2930.076984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2930.082368] ? should_fail+0x142/0x7b0 [ 2930.086280] ? fs_reclaim_release+0xd0/0x110 [ 2930.090705] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2930.095560] ? setup_fault_attr+0x200/0x200 15:13:37 executing program 1: socketpair(0x1, 0x5, 0xf000000, &(0x7f0000000640)) [ 2930.099977] ? lock_acquire+0x170/0x3c0 [ 2930.103983] ? check_preemption_disabled+0x41/0x280 [ 2930.109037] ? should_fail+0x142/0x7b0 [ 2930.112936] ? setup_fault_attr+0x200/0x200 [ 2930.117296] ? __lockdep_init_map+0x100/0x5a0 [ 2930.121823] ? find_next_bit+0x105/0x130 [ 2930.125900] ? __cpu_to_node+0x7b/0xa0 [ 2930.129834] ? blk_mq_hw_queue_to_node+0xc1/0x100 [ 2930.134692] blk_mq_alloc_rqs+0x242/0x800 [ 2930.139144] ? blk_mq_alloc_rq_map+0xaa/0x230 [ 2930.143658] __blk_mq_alloc_rq_map+0x15b/0x3b0 15:13:37 executing program 1: socketpair(0x1, 0x5, 0xf010000, &(0x7f0000000640)) [ 2930.148262] blk_mq_alloc_tag_set+0x589/0xa30 [ 2930.152784] loop_add+0x26d/0x8a0 [ 2930.156258] loop_control_ioctl+0x16c/0x480 [ 2930.160584] ? loop_lookup+0x1d0/0x1d0 [ 2930.164489] ? ksys_write+0x241/0x2a0 [ 2930.168304] ? loop_lookup+0x1d0/0x1d0 [ 2930.172207] do_vfs_ioctl+0xcdb/0x12e0 [ 2930.176110] ? lock_downgrade+0x720/0x720 [ 2930.180276] ? check_preemption_disabled+0x41/0x280 [ 2930.185306] ? ioctl_preallocate+0x200/0x200 [ 2930.189725] ? __fget+0x356/0x510 [ 2930.193196] ? do_dup2+0x450/0x450 [ 2930.196743] ? vfs_write+0x393/0x540 15:13:37 executing program 1: socketpair(0x1, 0x5, 0x10000000, &(0x7f0000000640)) [ 2930.200467] ? fput+0x2b/0x190 [ 2930.203671] ksys_ioctl+0x9b/0xc0 [ 2930.207136] __x64_sys_ioctl+0x6f/0xb0 [ 2930.211037] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2930.215627] do_syscall_64+0xf9/0x620 [ 2930.219439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2930.224642] RIP: 0033:0x465ef9 [ 2930.227842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xeb00, &(0x7f0000000640)) [ 2930.246841] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2930.254559] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2930.261837] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2930.269109] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2930.276386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2930.283661] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:37 executing program 2 (fault-call:1 fault-nth:10): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x0, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xeb01, &(0x7f0000000640)) 15:13:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x0, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:37 executing program 1: socketpair(0x1, 0x5, 0x10010000, &(0x7f0000000640)) 15:13:37 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x4000, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xec00, &(0x7f0000000640)) 15:13:37 executing program 1: socketpair(0x1, 0x5, 0x11000000, &(0x7f0000000640)) [ 2930.469200] FAULT_INJECTION: forcing a failure. [ 2930.469200] name failslab, interval 1, probability 0, space 0, times 0 [ 2930.512845] CPU: 0 PID: 31543 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2930.520784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2930.530144] Call Trace: [ 2930.532783] dump_stack+0x1fc/0x2ef [ 2930.536431] should_fail.cold+0xa/0xf [ 2930.540274] ? setup_fault_attr+0x200/0x200 [ 2930.544615] ? lock_acquire+0x170/0x3c0 [ 2930.548626] __should_failslab+0x115/0x180 [ 2930.552875] should_failslab+0x5/0x10 [ 2930.556692] kmem_cache_alloc_node+0x245/0x3b0 15:13:37 executing program 1: socketpair(0x1, 0x5, 0x11010000, &(0x7f0000000640)) [ 2930.561291] blk_alloc_queue_node+0x32/0xbd0 [ 2930.565716] blk_mq_init_queue+0x44/0xa0 [ 2930.569783] loop_add+0x2cb/0x8a0 [ 2930.573249] loop_control_ioctl+0x16c/0x480 [ 2930.577584] ? loop_lookup+0x1d0/0x1d0 [ 2930.581491] ? ksys_write+0x241/0x2a0 [ 2930.585304] ? loop_lookup+0x1d0/0x1d0 [ 2930.589204] do_vfs_ioctl+0xcdb/0x12e0 [ 2930.593111] ? lock_downgrade+0x720/0x720 [ 2930.597269] ? check_preemption_disabled+0x41/0x280 [ 2930.602299] ? ioctl_preallocate+0x200/0x200 [ 2930.606726] ? __fget+0x356/0x510 [ 2930.610194] ? do_dup2+0x450/0x450 [ 2930.613752] ? vfs_write+0x393/0x540 [ 2930.617473] ? fput+0x2b/0x190 [ 2930.620678] ksys_ioctl+0x9b/0xc0 [ 2930.624150] __x64_sys_ioctl+0x6f/0xb0 [ 2930.628048] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2930.632826] do_syscall_64+0xf9/0x620 [ 2930.636655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2930.641850] RIP: 0033:0x465ef9 15:13:37 executing program 1: socketpair(0x1, 0x5, 0x12000000, &(0x7f0000000640)) 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xec01, &(0x7f0000000640)) 15:13:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x0, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2930.645655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2930.664918] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2930.672635] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2930.679913] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2930.687460] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2930.694752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2930.702030] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:37 executing program 2 (fault-call:1 fault-nth:11): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x0, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:37 executing program 1: socketpair(0x1, 0x5, 0x12010000, &(0x7f0000000640)) 15:13:37 executing program 3: ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xed00, &(0x7f0000000640)) 15:13:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x0, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:37 executing program 1: socketpair(0x1, 0x5, 0x13000000, &(0x7f0000000640)) 15:13:37 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xada9}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x80000000000003, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000040)={0x0, r1}) 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xed01, &(0x7f0000000640)) [ 2930.863904] FAULT_INJECTION: forcing a failure. [ 2930.863904] name failslab, interval 1, probability 0, space 0, times 0 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xee00, &(0x7f0000000640)) [ 2930.925733] CPU: 1 PID: 31569 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2930.933663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2930.943058] Call Trace: [ 2930.945682] dump_stack+0x1fc/0x2ef [ 2930.949322] should_fail.cold+0xa/0xf [ 2930.953142] ? setup_fault_attr+0x200/0x200 [ 2930.957485] ? lock_acquire+0x170/0x3c0 [ 2930.961490] __should_failslab+0x115/0x180 [ 2930.965770] should_failslab+0x5/0x10 [ 2930.969628] kmem_cache_alloc_node_trace+0x244/0x3b0 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xee01, &(0x7f0000000640)) 15:13:37 executing program 5: socketpair(0x1, 0x5, 0xef00, &(0x7f0000000640)) [ 2930.974751] __kmalloc_node+0x38/0x70 [ 2930.978587] ? mempool_free+0x370/0x370 [ 2930.982579] mempool_init_node+0x137/0x6c0 [ 2930.986832] ? mempool_alloc+0x350/0x350 [ 2930.990903] ? mempool_free+0x370/0x370 [ 2930.994891] mempool_init+0x38/0x50 [ 2930.998545] bioset_init+0x327/0x810 [ 2931.002275] ? kmem_cache_alloc_node+0x351/0x3b0 [ 2931.007067] blk_alloc_queue_node+0x189/0xbd0 [ 2931.011578] blk_mq_init_queue+0x44/0xa0 [ 2931.015654] loop_add+0x2cb/0x8a0 [ 2931.019130] loop_control_ioctl+0x16c/0x480 [ 2931.023467] ? loop_lookup+0x1d0/0x1d0 [ 2931.027373] ? ksys_write+0x241/0x2a0 [ 2931.031187] ? loop_lookup+0x1d0/0x1d0 [ 2931.035088] do_vfs_ioctl+0xcdb/0x12e0 [ 2931.039010] ? lock_downgrade+0x720/0x720 [ 2931.043298] ? check_preemption_disabled+0x41/0x280 [ 2931.048337] ? ioctl_preallocate+0x200/0x200 [ 2931.052778] ? __fget+0x356/0x510 [ 2931.056329] ? do_dup2+0x450/0x450 [ 2931.059971] ? vfs_write+0x393/0x540 [ 2931.063721] ? fput+0x2b/0x190 [ 2931.067041] ksys_ioctl+0x9b/0xc0 [ 2931.070519] __x64_sys_ioctl+0x6f/0xb0 [ 2931.074417] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2931.079719] do_syscall_64+0xf9/0x620 [ 2931.083531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2931.088725] RIP: 0033:0x465ef9 [ 2931.091937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2931.111119] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2931.118871] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 15:13:38 executing program 2 (fault-call:1 fault-nth:12): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x0, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:38 executing program 5: socketpair(0x1, 0x5, 0xef01, &(0x7f0000000640)) 15:13:38 executing program 1: socketpair(0x1, 0x5, 0x13010000, &(0x7f0000000640)) 15:13:38 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000140)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x96fc, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x27}}, 0x4}}}, 0x30) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r2, 0x7b1, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r2, 0x7a6, &(0x7f0000000100)={0x9d4b, 0x7, 0x7, 0x8cd, 0x3, 0xcbf8}) 15:13:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x0, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2931.126235] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2931.134051] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2931.141343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2931.148644] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 [ 2931.242506] FAULT_INJECTION: forcing a failure. [ 2931.242506] name failslab, interval 1, probability 0, space 0, times 0 [ 2931.274941] CPU: 0 PID: 31593 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2931.282868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2931.292318] Call Trace: [ 2931.294925] dump_stack+0x1fc/0x2ef [ 2931.298560] should_fail.cold+0xa/0xf [ 2931.302373] ? setup_fault_attr+0x200/0x200 [ 2931.306717] ? lock_acquire+0x170/0x3c0 [ 2931.310708] ? mempool_free+0x370/0x370 [ 2931.314782] ? mempool_free+0x370/0x370 [ 2931.318767] __should_failslab+0x115/0x180 [ 2931.323024] should_failslab+0x5/0x10 [ 2931.326937] kmem_cache_alloc+0x277/0x370 [ 2931.331093] ? mempool_alloc+0x350/0x350 [ 2931.335187] ? mempool_free+0x370/0x370 [ 2931.339182] mempool_init_node+0x2d0/0x6c0 [ 2931.343436] ? mempool_alloc+0x350/0x350 [ 2931.347523] ? mempool_free+0x370/0x370 [ 2931.351500] mempool_init+0x38/0x50 [ 2931.355172] bioset_init+0x327/0x810 [ 2931.358894] ? kmem_cache_alloc_node+0x351/0x3b0 [ 2931.363682] blk_alloc_queue_node+0x189/0xbd0 [ 2931.368185] blk_mq_init_queue+0x44/0xa0 [ 2931.372312] loop_add+0x2cb/0x8a0 [ 2931.375771] loop_control_ioctl+0x16c/0x480 [ 2931.380093] ? loop_lookup+0x1d0/0x1d0 [ 2931.383980] ? ksys_write+0x241/0x2a0 [ 2931.387889] ? loop_lookup+0x1d0/0x1d0 [ 2931.391782] do_vfs_ioctl+0xcdb/0x12e0 [ 2931.395676] ? lock_downgrade+0x720/0x720 [ 2931.399840] ? check_preemption_disabled+0x41/0x280 [ 2931.405016] ? ioctl_preallocate+0x200/0x200 [ 2931.409517] ? __fget+0x356/0x510 [ 2931.413270] ? do_dup2+0x450/0x450 [ 2931.416810] ? vfs_write+0x393/0x540 [ 2931.420920] ? fput+0x2b/0x190 [ 2931.424154] ksys_ioctl+0x9b/0xc0 [ 2931.427611] __x64_sys_ioctl+0x6f/0xb0 [ 2931.431500] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2931.436092] do_syscall_64+0xf9/0x620 [ 2931.439899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2931.445288] RIP: 0033:0x465ef9 [ 2931.448491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2931.467391] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2931.475108] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2931.482381] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 15:13:38 executing program 5: socketpair(0x1, 0x5, 0xf000, &(0x7f0000000640)) 15:13:38 executing program 1: socketpair(0x1, 0x5, 0x14000000, &(0x7f0000000640)) [ 2931.489651] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2931.496926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2931.504320] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:38 executing program 5: socketpair(0x1, 0x5, 0xf001, &(0x7f0000000640)) 15:13:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x0, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:38 executing program 2 (fault-call:1 fault-nth:13): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x0, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:38 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0xb4000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:38 executing program 1: socketpair(0x1, 0x5, 0x14010000, &(0x7f0000000640)) [ 2931.676303] FAULT_INJECTION: forcing a failure. [ 2931.676303] name failslab, interval 1, probability 0, space 0, times 0 [ 2931.691282] CPU: 0 PID: 31615 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2931.699202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2931.708571] Call Trace: [ 2931.711182] dump_stack+0x1fc/0x2ef [ 2931.714841] should_fail.cold+0xa/0xf [ 2931.718654] ? setup_fault_attr+0x200/0x200 15:13:38 executing program 1: socketpair(0x1, 0x5, 0x15000000, &(0x7f0000000640)) [ 2931.722989] ? lock_acquire+0x170/0x3c0 [ 2931.726977] __should_failslab+0x115/0x180 [ 2931.731232] should_failslab+0x5/0x10 [ 2931.735049] kmem_cache_alloc+0x277/0x370 [ 2931.739209] ? mempool_alloc+0x350/0x350 [ 2931.743276] mempool_init_node+0x2d0/0x6c0 [ 2931.747524] ? mempool_alloc+0x350/0x350 [ 2931.751594] ? mempool_free+0x370/0x370 [ 2931.755580] mempool_init+0x38/0x50 [ 2931.759267] bioset_init+0x327/0x810 [ 2931.763016] ? kmem_cache_alloc_node+0x351/0x3b0 [ 2931.767814] blk_alloc_queue_node+0x189/0xbd0 [ 2931.772353] blk_mq_init_queue+0x44/0xa0 15:13:38 executing program 1: socketpair(0x1, 0x5, 0x15010000, &(0x7f0000000640)) [ 2931.776431] loop_add+0x2cb/0x8a0 [ 2931.779899] loop_control_ioctl+0x16c/0x480 [ 2931.784231] ? loop_lookup+0x1d0/0x1d0 [ 2931.788134] ? ksys_write+0x241/0x2a0 [ 2931.791944] ? loop_lookup+0x1d0/0x1d0 [ 2931.795848] do_vfs_ioctl+0xcdb/0x12e0 [ 2931.799758] ? lock_downgrade+0x720/0x720 [ 2931.804178] ? check_preemption_disabled+0x41/0x280 [ 2931.809210] ? ioctl_preallocate+0x200/0x200 [ 2931.813643] ? __fget+0x356/0x510 [ 2931.817111] ? do_dup2+0x450/0x450 [ 2931.820836] ? vfs_write+0x393/0x540 15:13:38 executing program 1: socketpair(0x1, 0x5, 0x16000000, &(0x7f0000000640)) [ 2931.824570] ? fput+0x2b/0x190 [ 2931.827781] ksys_ioctl+0x9b/0xc0 [ 2931.831254] __x64_sys_ioctl+0x6f/0xb0 [ 2931.835254] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2931.839854] do_syscall_64+0xf9/0x620 [ 2931.843680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2931.848878] RIP: 0033:0x465ef9 [ 2931.852091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:13:38 executing program 5: socketpair(0x1, 0x5, 0xf100, &(0x7f0000000640)) 15:13:38 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x200, 0x169201) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) r2 = accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) accept$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) 15:13:38 executing program 1: socketpair(0x1, 0x5, 0x16010000, &(0x7f0000000640)) 15:13:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x0, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x0, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2931.871134] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2931.878860] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2931.886142] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2931.893513] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2931.900811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2931.908095] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:38 executing program 2 (fault-call:1 fault-nth:14): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:38 executing program 5: socketpair(0x1, 0x5, 0xf101, &(0x7f0000000640)) 15:13:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x0, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:39 executing program 1: socketpair(0x1, 0x5, 0x17000000, &(0x7f0000000640)) 15:13:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2932.081806] FAULT_INJECTION: forcing a failure. [ 2932.081806] name failslab, interval 1, probability 0, space 0, times 0 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf200, &(0x7f0000000640)) [ 2932.129102] CPU: 1 PID: 31640 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2932.137032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2932.146620] Call Trace: [ 2932.149847] dump_stack+0x1fc/0x2ef [ 2932.154028] should_fail.cold+0xa/0xf [ 2932.157855] ? setup_fault_attr+0x200/0x200 [ 2932.162801] ? lock_acquire+0x170/0x3c0 [ 2932.166815] __should_failslab+0x115/0x180 [ 2932.171098] should_failslab+0x5/0x10 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf201, &(0x7f0000000640)) [ 2932.175025] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2932.180159] __kmalloc_node+0x38/0x70 [ 2932.183979] ? mempool_free+0x370/0x370 [ 2932.187967] mempool_init_node+0x137/0x6c0 [ 2932.192264] ? mempool_alloc+0x350/0x350 [ 2932.196345] ? mempool_free+0x370/0x370 [ 2932.200333] mempool_init+0x38/0x50 [ 2932.204014] bioset_init+0x532/0x810 [ 2932.207740] ? kmem_cache_alloc_node+0x351/0x3b0 [ 2932.212702] blk_alloc_queue_node+0x189/0xbd0 [ 2932.217216] blk_mq_init_queue+0x44/0xa0 [ 2932.221331] loop_add+0x2cb/0x8a0 [ 2932.224830] loop_control_ioctl+0x16c/0x480 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf300, &(0x7f0000000640)) [ 2932.229176] ? loop_lookup+0x1d0/0x1d0 [ 2932.233223] ? ksys_write+0x241/0x2a0 [ 2932.237047] ? loop_lookup+0x1d0/0x1d0 [ 2932.240951] do_vfs_ioctl+0xcdb/0x12e0 [ 2932.244856] ? lock_downgrade+0x720/0x720 [ 2932.249034] ? check_preemption_disabled+0x41/0x280 [ 2932.254066] ? ioctl_preallocate+0x200/0x200 [ 2932.258498] ? __fget+0x356/0x510 [ 2932.261969] ? do_dup2+0x450/0x450 [ 2932.265547] ? vfs_write+0x393/0x540 [ 2932.269287] ? fput+0x2b/0x190 [ 2932.272494] ksys_ioctl+0x9b/0xc0 [ 2932.276008] __x64_sys_ioctl+0x6f/0xb0 [ 2932.279906] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2932.284583] do_syscall_64+0xf9/0x620 [ 2932.288407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2932.294161] RIP: 0033:0x465ef9 [ 2932.297365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2932.316298] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:39 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f00000000c0)=[0x1, 0x0, 0x4, 0x1, 0x3], 0x5, 0x0, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x3, 0x2, 0x0, 'syz0\x00', 0xfffffff7}) 15:13:39 executing program 1: socketpair(0x1, 0x5, 0x17010000, &(0x7f0000000640)) 15:13:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x0, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf301, &(0x7f0000000640)) 15:13:39 executing program 2 (fault-call:1 fault-nth:15): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2932.324015] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2932.331282] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2932.338558] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2932.346079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2932.353352] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:39 executing program 1: socketpair(0x1, 0x5, 0x18000000, &(0x7f0000000640)) 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf400, &(0x7f0000000640)) 15:13:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x0, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2932.511099] FAULT_INJECTION: forcing a failure. [ 2932.511099] name failslab, interval 1, probability 0, space 0, times 0 [ 2932.540098] CPU: 1 PID: 31665 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2932.548038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2932.557400] Call Trace: 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf401, &(0x7f0000000640)) [ 2932.560005] dump_stack+0x1fc/0x2ef [ 2932.563651] should_fail.cold+0xa/0xf [ 2932.567486] ? setup_fault_attr+0x200/0x200 [ 2932.571923] ? lock_acquire+0x170/0x3c0 [ 2932.576102] ? mempool_free+0x370/0x370 [ 2932.580115] ? mempool_free+0x370/0x370 [ 2932.584110] __should_failslab+0x115/0x180 [ 2932.589690] should_failslab+0x5/0x10 [ 2932.593607] kmem_cache_alloc+0x277/0x370 [ 2932.597768] ? mempool_alloc+0x350/0x350 [ 2932.602451] ? mempool_free+0x370/0x370 [ 2932.606439] mempool_init_node+0x2d0/0x6c0 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf500, &(0x7f0000000640)) 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf501, &(0x7f0000000640)) [ 2932.610811] ? mempool_alloc+0x350/0x350 [ 2932.614890] ? mempool_free+0x370/0x370 [ 2932.618903] mempool_init+0x38/0x50 [ 2932.622550] bioset_init+0x532/0x810 [ 2932.626368] ? kmem_cache_alloc_node+0x351/0x3b0 [ 2932.631153] blk_alloc_queue_node+0x189/0xbd0 [ 2932.635667] blk_mq_init_queue+0x44/0xa0 [ 2932.639825] loop_add+0x2cb/0x8a0 [ 2932.643292] loop_control_ioctl+0x16c/0x480 [ 2932.647714] ? loop_lookup+0x1d0/0x1d0 [ 2932.651619] ? ksys_write+0x241/0x2a0 [ 2932.655436] ? loop_lookup+0x1d0/0x1d0 [ 2932.659432] do_vfs_ioctl+0xcdb/0x12e0 [ 2932.663428] ? lock_downgrade+0x720/0x720 [ 2932.667598] ? check_preemption_disabled+0x41/0x280 [ 2932.672638] ? ioctl_preallocate+0x200/0x200 [ 2932.677081] ? __fget+0x356/0x510 [ 2932.680664] ? do_dup2+0x450/0x450 [ 2932.684249] ? vfs_write+0x393/0x540 [ 2932.687983] ? fput+0x2b/0x190 [ 2932.691226] ksys_ioctl+0x9b/0xc0 [ 2932.694719] __x64_sys_ioctl+0x6f/0xb0 [ 2932.698637] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2932.703245] do_syscall_64+0xf9/0x620 15:13:39 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf600, &(0x7f0000000640)) 15:13:39 executing program 1: socketpair(0x1, 0x5, 0x18010000, &(0x7f0000000640)) [ 2932.707078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2932.712396] RIP: 0033:0x465ef9 [ 2932.715718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2932.734909] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2932.742871] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2932.750155] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2932.758398] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2932.765687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2932.772972] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x0, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:39 executing program 2 (fault-call:1 fault-nth:16): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x0, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf601, &(0x7f0000000640)) 15:13:39 executing program 1: socketpair(0x1, 0x5, 0x19000000, &(0x7f0000000640)) 15:13:39 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000000c0)={0x0, 0xff}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x2041, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000140)={0x9}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000300)={0xffffffff, 0x0, 0x1}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x171340, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f00000001c0)={r1, 0x77e3}) r3 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r3, 0x7b1, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r3, 0x7a8, &(0x7f0000000240)={{@hyper, 0x5}, @hyper, 0xb, 0x3, 0x0, 0xc800, 0x80, 0x0, 0x8}) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) recvfrom$packet(r4, &(0x7f0000000280)=""/44, 0x2c, 0x20, &(0x7f00000002c0)={0x11, 0x7, 0x0, 0x1, 0xfc, 0x6, @remote}, 0x14) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0xffffffffffffffd3, 0xfa00, {0x0, {0xa, 0x4e22, 0xbff3, @loopback, 0x4}}}, 0x30) 15:13:39 executing program 5: socketpair(0x1, 0x5, 0xf700, &(0x7f0000000640)) [ 2932.955592] FAULT_INJECTION: forcing a failure. [ 2932.955592] name failslab, interval 1, probability 0, space 0, times 0 [ 2932.998390] CPU: 1 PID: 31694 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2933.006497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2933.015947] Call Trace: [ 2933.018560] dump_stack+0x1fc/0x2ef [ 2933.022561] should_fail.cold+0xa/0xf [ 2933.026403] ? setup_fault_attr+0x200/0x200 [ 2933.030737] ? lock_acquire+0x170/0x3c0 [ 2933.034730] __should_failslab+0x115/0x180 [ 2933.038979] should_failslab+0x5/0x10 [ 2933.042874] kmem_cache_alloc+0x277/0x370 [ 2933.047038] ? mempool_alloc+0x350/0x350 [ 2933.051118] mempool_init_node+0x2d0/0x6c0 [ 2933.055374] ? mempool_alloc+0x350/0x350 [ 2933.059434] ? mempool_free+0x370/0x370 [ 2933.063414] mempool_init+0x38/0x50 [ 2933.067056] bioset_init+0x532/0x810 [ 2933.070781] ? kmem_cache_alloc_node+0x351/0x3b0 [ 2933.075557] blk_alloc_queue_node+0x189/0xbd0 [ 2933.080067] blk_mq_init_queue+0x44/0xa0 [ 2933.084136] loop_add+0x2cb/0x8a0 [ 2933.087600] loop_control_ioctl+0x16c/0x480 [ 2933.092377] ? loop_lookup+0x1d0/0x1d0 15:13:40 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7f, 0x0, 0x2}) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f00000000c0)={r1, 0x4}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000280)={@private0}, &(0x7f00000002c0)=0x14) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, 0x0, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000200)={r7, 0x5, 0x4, 0x9}, &(0x7f0000000240)=0x10) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000100)={'bond0\x00'}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 15:13:40 executing program 5: socketpair(0x1, 0x5, 0xf701, &(0x7f0000000640)) [ 2933.096459] ? ksys_write+0x241/0x2a0 [ 2933.100396] ? loop_lookup+0x1d0/0x1d0 [ 2933.104328] do_vfs_ioctl+0xcdb/0x12e0 [ 2933.108498] ? lock_downgrade+0x720/0x720 [ 2933.112668] ? check_preemption_disabled+0x41/0x280 [ 2933.118167] ? ioctl_preallocate+0x200/0x200 [ 2933.122608] ? __fget+0x356/0x510 [ 2933.126071] ? do_dup2+0x450/0x450 [ 2933.129721] ? vfs_write+0x393/0x540 [ 2933.133445] ? fput+0x2b/0x190 [ 2933.136750] ksys_ioctl+0x9b/0xc0 [ 2933.140215] __x64_sys_ioctl+0x6f/0xb0 [ 2933.144115] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2933.148707] do_syscall_64+0xf9/0x620 [ 2933.152544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2933.157990] RIP: 0033:0x465ef9 [ 2933.161283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2933.180431] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2933.188142] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x19010000, &(0x7f0000000640)) 15:13:40 executing program 5: socketpair(0x1, 0x5, 0xf800, &(0x7f0000000640)) 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1a000000, &(0x7f0000000640)) [ 2933.196433] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2933.205457] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2933.212819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2933.220706] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:40 executing program 2 (fault-call:1 fault-nth:17): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:40 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r2, 0x7b1, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r2, 0x7a4, &(0x7f0000000180)={{@hyper, 0x4}, 0xffffffffffffffe6, 0x7e0c, 0xcd, 0x3}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f0000000200)={0xffffffffffffffff}) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, 0x0, 0x0) ioctl$CHAR_RAW_DISCARD(r5, 0x1277, &(0x7f0000000140)=0x357544e4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x30000000}, 0x8) ioctl$CHAR_RAW_ROGET(r4, 0x125e, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x0, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1a010000, &(0x7f0000000640)) 15:13:40 executing program 5: socketpair(0x1, 0x5, 0xf801, &(0x7f0000000640)) 15:13:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x0, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(r0, 0x7a9, &(0x7f0000000100)={{@host, 0x6}, 0x1000, 0x9, 0x10001, 0x8, 0x9, 0x1, 0x2, 0x5}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x1, 0x8], 0x2, 0x1800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000001c0)={0x8}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f0000000200)={0x0, 0x400}) [ 2933.447123] FAULT_INJECTION: forcing a failure. [ 2933.447123] name failslab, interval 1, probability 0, space 0, times 0 [ 2933.493759] CPU: 1 PID: 31725 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2933.501784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2933.511171] Call Trace: [ 2933.513823] dump_stack+0x1fc/0x2ef [ 2933.517518] should_fail.cold+0xa/0xf [ 2933.521428] ? setup_fault_attr+0x200/0x200 [ 2933.526206] ? lock_acquire+0x170/0x3c0 [ 2933.530231] __should_failslab+0x115/0x180 [ 2933.534483] should_failslab+0x5/0x10 [ 2933.538305] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2933.543550] bdi_alloc_node+0x5c/0xd0 [ 2933.547397] blk_alloc_queue_node+0x1af/0xbd0 [ 2933.551926] blk_mq_init_queue+0x44/0xa0 [ 2933.556000] loop_add+0x2cb/0x8a0 [ 2933.559462] loop_control_ioctl+0x16c/0x480 [ 2933.563807] ? loop_lookup+0x1d0/0x1d0 [ 2933.567732] ? ksys_write+0x241/0x2a0 [ 2933.571549] ? loop_lookup+0x1d0/0x1d0 [ 2933.575462] do_vfs_ioctl+0xcdb/0x12e0 [ 2933.579362] ? lock_downgrade+0x720/0x720 [ 2933.583531] ? check_preemption_disabled+0x41/0x280 [ 2933.588543] ? ioctl_preallocate+0x200/0x200 [ 2933.592947] ? __fget+0x356/0x510 [ 2933.596492] ? do_dup2+0x450/0x450 [ 2933.600068] ? vfs_write+0x393/0x540 [ 2933.603788] ? fput+0x2b/0x190 [ 2933.607321] ksys_ioctl+0x9b/0xc0 [ 2933.610774] __x64_sys_ioctl+0x6f/0xb0 [ 2933.614760] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2933.619335] do_syscall_64+0xf9/0x620 [ 2933.623160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2933.628359] RIP: 0033:0x465ef9 15:13:40 executing program 5: socketpair(0x1, 0x5, 0xf900, &(0x7f0000000640)) 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1b000000, &(0x7f0000000640)) [ 2933.631903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2933.650827] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2933.658539] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2933.665969] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2933.673245] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2933.680508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:13:40 executing program 5: socketpair(0x1, 0x5, 0xf901, &(0x7f0000000640)) [ 2933.687772] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:40 executing program 2 (fault-call:1 fault-nth:18): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x0, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x8200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1b010000, &(0x7f0000000640)) 15:13:40 executing program 5: socketpair(0x1, 0x5, 0xfa00, &(0x7f0000000640)) 15:13:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1c000000, &(0x7f0000000640)) 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1c010000, &(0x7f0000000640)) [ 2933.898617] FAULT_INJECTION: forcing a failure. [ 2933.898617] name failslab, interval 1, probability 0, space 0, times 0 [ 2933.912560] CPU: 1 PID: 31751 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2933.921006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2933.930372] Call Trace: [ 2933.932976] dump_stack+0x1fc/0x2ef [ 2933.936648] should_fail.cold+0xa/0xf [ 2933.940656] ? setup_fault_attr+0x200/0x200 [ 2933.945000] ? lock_acquire+0x170/0x3c0 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1d000000, &(0x7f0000000640)) [ 2933.949010] __should_failslab+0x115/0x180 [ 2933.953709] should_failslab+0x5/0x10 [ 2933.957525] kmem_cache_alloc_trace+0x284/0x380 [ 2933.962210] wb_congested_get_create+0x180/0x3a0 [ 2933.967004] wb_init+0x4a7/0x770 [ 2933.970405] ? __raw_spin_lock_init+0x28/0x100 [ 2933.975120] bdi_init+0x29c/0x410 [ 2933.978595] bdi_alloc_node+0x76/0xd0 [ 2933.982416] blk_alloc_queue_node+0x1af/0xbd0 [ 2933.986937] blk_mq_init_queue+0x44/0xa0 [ 2933.991019] loop_add+0x2cb/0x8a0 [ 2933.994497] loop_control_ioctl+0x16c/0x480 15:13:40 executing program 1: socketpair(0x1, 0x5, 0x1d010000, &(0x7f0000000640)) [ 2933.999037] ? loop_lookup+0x1d0/0x1d0 [ 2934.002956] ? ksys_write+0x241/0x2a0 [ 2934.006767] ? loop_lookup+0x1d0/0x1d0 [ 2934.010669] do_vfs_ioctl+0xcdb/0x12e0 [ 2934.014574] ? lock_downgrade+0x720/0x720 [ 2934.018739] ? check_preemption_disabled+0x41/0x280 [ 2934.023882] ? ioctl_preallocate+0x200/0x200 [ 2934.028340] ? __fget+0x356/0x510 [ 2934.031815] ? do_dup2+0x450/0x450 [ 2934.036159] ? vfs_write+0x393/0x540 [ 2934.039892] ? fput+0x2b/0x190 [ 2934.043114] ksys_ioctl+0x9b/0xc0 [ 2934.046639] __x64_sys_ioctl+0x6f/0xb0 [ 2934.050625] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2934.055219] do_syscall_64+0xf9/0x620 [ 2934.059064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2934.064283] RIP: 0033:0x465ef9 [ 2934.067485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2934.087266] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:41 executing program 5: socketpair(0x1, 0x5, 0xfa01, &(0x7f0000000640)) [ 2934.094981] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2934.102239] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2934.109498] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2934.116777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2934.124124] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:41 executing program 2 (fault-call:1 fault-nth:19): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:41 executing program 1: socketpair(0x1, 0x5, 0x1e000000, &(0x7f0000000640)) 15:13:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x0, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f00000004c0)={&(0x7f0000000080)={{@my=0x1, 0x263}, {@local}, 0x400, "34054d472a6ab35edb2194aeda7be9d92dd44d61cad6b9e72492b6586ed2c9693be52d0bd216ed51a65d9a3f3482e6b7ef4ae2e68e92daa87e81bbd58b2e69c5f8ded78aa205eb5f8dc73005d7558d9c75cbcf64acb081322242053f808c2a8d8a3be2211e5324c79ae737007800c9e603d83746d57000bd4feb78321d0ed78cb9cc2ab6696d04fa9020116e44229511b4d07eaac6dc776bf967d388a3759bf0c604ac190da664e7475ff47d4fb7e4a89904eeea5e1ce057df0f18062c2ca7543081c69de9e0ea4e780c08870a5b16d2459ea38d8486c0cc154fee1b97500d1816170ed4fd8a5753cfa46afdc20f542cd431b129f86598dddf462e159e71bf3b09b566875e52c53452afda73506900f6edbab107c42ff3d533b5a924b193296f1b764c0b7c94cc16a7d74fd29d98361125367d81b7728751685e08e06400c80682638c3509462dfc07fc1cd9262e9a38850ca81065f2adba33dfa5e014702306599c045495915a4e916d546cb15f62ace74fa6393eb3bf5307cbf6e56becb84b942bc4af5b69aa429c684c40d4e678ffad9d51d1791960b3917d2bdb94d926e9c37a7a2601665478d3b215822f058ef14e6e478dc7e1d69e9983add99ee483cacb285e93215b2d37afd72b1351eef0f629b0fd323b9aea79459554b387efdfeb377d9b9b92bff0fd32d7971452aa574522c4f6c817bb1746e0f38aa7b8de8701d74f43d17aa71f1248ffb84365ad1a2e15e7ba01a3122b79410187c7ca6f1bc92fbc7a6768b32d3bcba2ca6b9af4c6284973ddbe966e8cbb01aafb82703447656bc68134c66e27895463b5ace89b5c79a852bf5e94e835f9b9d8611b1ae9a1ce3ed353d27a195188dcc88d7f5bfd4a50dba7fecf2b4e797fe047c6c33e7ac89d91145b794f2c0565b1a10b2b6751a4a79676115241351229c4583ed86f3dab71dd8528f3d76478ee7ac183033121769cb593df27d6829977bad9f1960e5a93192c308f65e1eca87186d08325da67ca86a2026e330321197d2228094922297baac2536767a03f957b9a560398d61d0193bcb6276277092bea64055f3b8aed9b1e49cfdd046e7ca35ea6d570d95f9c872005c63aa2ed5bffff216005e56f0d024ab0dc85a4e18d61a38549889122e1426068d349ffed2880438bb9bd62bba80cdc3f5848db49eec15c606ba7bd91c4611c971cf07a9a5e4c06d08379531ea7d6662f0fd91eb05a1d88a8944bb2851adf8e89efda17016eee853e85ec3f13846d65c727b27a63f7652156301a635c758bedd40f9613ebd67e6ec3b9826f2c3058270b22ac1b986f321a26e13165060976317e85958de6841faccd20a197735427cf39bae874b831d02be50f45a2f570077a69d36ace18a03fb03c7db6ef1293b35fb267b2ca9cae64b5e66e68de2f9b2829481325e08000f326f8c6319872fd07c5"}, 0x418, 0x8000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) 15:13:41 executing program 5: socketpair(0x1, 0x5, 0xfb00, &(0x7f0000000640)) 15:13:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 5: socketpair(0x1, 0x5, 0xfb01, &(0x7f0000000640)) 15:13:41 executing program 1: socketpair(0x1, 0x5, 0x1e010000, &(0x7f0000000640)) 15:13:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x0, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 1: socketpair(0x1, 0x5, 0x1f000000, &(0x7f0000000640)) [ 2934.358170] FAULT_INJECTION: forcing a failure. [ 2934.358170] name failslab, interval 1, probability 0, space 0, times 0 15:13:41 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0x8}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(0xffffffffffffffff, 0xc00464c9, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2934.402793] CPU: 1 PID: 31785 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2934.410979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2934.420344] Call Trace: [ 2934.422951] dump_stack+0x1fc/0x2ef [ 2934.426704] should_fail.cold+0xa/0xf [ 2934.430546] ? setup_fault_attr+0x200/0x200 [ 2934.434885] ? lock_acquire+0x170/0x3c0 [ 2934.438886] __should_failslab+0x115/0x180 [ 2934.443148] should_failslab+0x5/0x10 [ 2934.446962] kmem_cache_alloc_trace+0x284/0x380 [ 2934.451674] blk_alloc_queue_stats+0x3c/0x100 [ 2934.456183] blk_alloc_queue_node+0x1eb/0xbd0 [ 2934.460693] blk_mq_init_queue+0x44/0xa0 [ 2934.464777] loop_add+0x2cb/0x8a0 [ 2934.468255] loop_control_ioctl+0x16c/0x480 [ 2934.472586] ? loop_lookup+0x1d0/0x1d0 [ 2934.476491] ? ksys_write+0x241/0x2a0 [ 2934.480391] ? loop_lookup+0x1d0/0x1d0 [ 2934.484378] do_vfs_ioctl+0xcdb/0x12e0 [ 2934.488275] ? lock_downgrade+0x720/0x720 [ 2934.492457] ? check_preemption_disabled+0x41/0x280 [ 2934.497488] ? ioctl_preallocate+0x200/0x200 [ 2934.501916] ? __fget+0x356/0x510 [ 2934.505381] ? do_dup2+0x450/0x450 [ 2934.508934] ? vfs_write+0x393/0x540 [ 2934.512786] ? fput+0x2b/0x190 [ 2934.516084] ksys_ioctl+0x9b/0xc0 [ 2934.519550] __x64_sys_ioctl+0x6f/0xb0 [ 2934.523450] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2934.528071] do_syscall_64+0xf9/0x620 [ 2934.531974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2934.537172] RIP: 0033:0x465ef9 [ 2934.540374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2934.559278] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2934.567109] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2934.574450] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2934.581934] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2934.589218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2934.597648] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:41 executing program 2 (fault-call:1 fault-nth:20): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:41 executing program 1: socketpair(0x1, 0x5, 0x1f010000, &(0x7f0000000640)) 15:13:41 executing program 5: socketpair(0x1, 0x5, 0xfc00, &(0x7f0000000640)) 15:13:41 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x7, 0x0, 0x10000}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000000c0)={r1, 0x5}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000100)={0x0, r1}) 15:13:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x0, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x0, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 1: socketpair(0x1, 0x5, 0x20000000, &(0x7f0000000640)) 15:13:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x0, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 5: socketpair(0x1, 0x5, 0xfc01, &(0x7f0000000640)) 15:13:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x0, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2934.750587] FAULT_INJECTION: forcing a failure. [ 2934.750587] name failslab, interval 1, probability 0, space 0, times 0 [ 2934.792331] CPU: 1 PID: 31811 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2934.800280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2934.810081] Call Trace: [ 2934.813586] dump_stack+0x1fc/0x2ef [ 2934.817229] should_fail.cold+0xa/0xf [ 2934.821078] ? setup_fault_attr+0x200/0x200 [ 2934.825421] ? lock_acquire+0x170/0x3c0 [ 2934.829417] __should_failslab+0x115/0x180 [ 2934.833689] should_failslab+0x5/0x10 [ 2934.837514] kmem_cache_alloc_node_trace+0x244/0x3b0 15:13:41 executing program 1: socketpair(0x1, 0x5, 0x20010000, &(0x7f0000000640)) 15:13:41 executing program 5: socketpair(0x1, 0x5, 0xfd00, &(0x7f0000000640)) [ 2934.842687] blkg_alloc+0x92/0x630 [ 2934.846288] blkcg_init_queue+0x24/0x540 [ 2934.850377] blk_alloc_queue_node+0x7b6/0xbd0 [ 2934.854892] blk_mq_init_queue+0x44/0xa0 [ 2934.858966] loop_add+0x2cb/0x8a0 [ 2934.862630] loop_control_ioctl+0x16c/0x480 [ 2934.866977] ? loop_lookup+0x1d0/0x1d0 [ 2934.870911] ? ksys_write+0x241/0x2a0 [ 2934.874721] ? loop_lookup+0x1d0/0x1d0 [ 2934.878622] do_vfs_ioctl+0xcdb/0x12e0 [ 2934.882524] ? lock_downgrade+0x720/0x720 [ 2934.886775] ? check_preemption_disabled+0x41/0x280 [ 2934.891808] ? ioctl_preallocate+0x200/0x200 [ 2934.896253] ? __fget+0x356/0x510 [ 2934.899733] ? do_dup2+0x450/0x450 [ 2934.903282] ? vfs_write+0x393/0x540 [ 2934.907030] ? fput+0x2b/0x190 [ 2934.910420] ksys_ioctl+0x9b/0xc0 [ 2934.913886] __x64_sys_ioctl+0x6f/0xb0 [ 2934.917790] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2934.922474] do_syscall_64+0xf9/0x620 [ 2934.926294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2934.931493] RIP: 0033:0x465ef9 [ 2934.934702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2934.953722] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2934.961458] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2934.968740] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2934.976023] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2934.983299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2934.990572] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:41 executing program 2 (fault-call:1 fault-nth:21): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:41 executing program 5: socketpair(0x1, 0x5, 0xfd01, &(0x7f0000000640)) 15:13:41 executing program 1: socketpair(0x1, 0x5, 0x21000000, &(0x7f0000000640)) 15:13:41 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x7, 0x309080) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000000c0)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x0, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2935.123488] FAULT_INJECTION: forcing a failure. [ 2935.123488] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.141162] CPU: 0 PID: 31833 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2935.149163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2935.158528] Call Trace: [ 2935.161144] dump_stack+0x1fc/0x2ef [ 2935.164786] should_fail.cold+0xa/0xf [ 2935.168610] ? setup_fault_attr+0x200/0x200 [ 2935.172944] ? lock_acquire+0x170/0x3c0 [ 2935.176937] __should_failslab+0x115/0x180 [ 2935.181185] should_failslab+0x5/0x10 [ 2935.185430] kmem_cache_alloc_trace+0x284/0x380 [ 2935.190141] blk_iolatency_init+0x47/0x2d0 [ 2935.194513] blkcg_init_queue+0x1c1/0x540 [ 2935.199534] blk_alloc_queue_node+0x7b6/0xbd0 [ 2935.204064] blk_mq_init_queue+0x44/0xa0 [ 2935.208140] loop_add+0x2cb/0x8a0 [ 2935.211687] loop_control_ioctl+0x16c/0x480 [ 2935.216032] ? loop_lookup+0x1d0/0x1d0 [ 2935.219917] ? ksys_write+0x241/0x2a0 [ 2935.223731] ? loop_lookup+0x1d0/0x1d0 [ 2935.227624] do_vfs_ioctl+0xcdb/0x12e0 [ 2935.231547] ? lock_downgrade+0x720/0x720 [ 2935.235695] ? check_preemption_disabled+0x41/0x280 [ 2935.240823] ? ioctl_preallocate+0x200/0x200 [ 2935.245265] ? __fget+0x356/0x510 [ 2935.248729] ? do_dup2+0x450/0x450 [ 2935.252286] ? vfs_write+0x393/0x540 [ 2935.256011] ? fput+0x2b/0x190 [ 2935.259204] ksys_ioctl+0x9b/0xc0 [ 2935.262654] __x64_sys_ioctl+0x6f/0xb0 [ 2935.266564] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2935.271233] do_syscall_64+0xf9/0x620 [ 2935.275125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2935.280340] RIP: 0033:0x465ef9 [ 2935.283526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2935.302505] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2935.310208] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 15:13:42 executing program 5: socketpair(0x1, 0x5, 0xfe00, &(0x7f0000000640)) 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x21010000, &(0x7f0000000640)) 15:13:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x0, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2935.317529] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2935.324803] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2935.332243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2935.339513] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:42 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000080)=0xffff2e2e) 15:13:42 executing program 2 (fault-call:1 fault-nth:22): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x22000000, &(0x7f0000000640)) 15:13:42 executing program 5: socketpair(0x1, 0x5, 0xfe01, &(0x7f0000000640)) [ 2935.502137] FAULT_INJECTION: forcing a failure. [ 2935.502137] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.520098] CPU: 1 PID: 31849 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2935.528026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2935.537395] Call Trace: [ 2935.540018] dump_stack+0x1fc/0x2ef [ 2935.543662] should_fail.cold+0xa/0xf [ 2935.547827] ? setup_fault_attr+0x200/0x200 [ 2935.552333] ? lock_acquire+0x170/0x3c0 [ 2935.556328] __should_failslab+0x115/0x180 [ 2935.560605] should_failslab+0x5/0x10 [ 2935.564426] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2935.569546] ? iolatency_pd_init+0x6f0/0x6f0 [ 2935.573977] iolatency_pd_alloc+0x6e/0x120 [ 2935.578242] blkcg_activate_policy+0x120/0x5d0 [ 2935.582850] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2935.587914] blk_iolatency_init+0x123/0x2d0 [ 2935.592266] blkcg_init_queue+0x1c1/0x540 [ 2935.596457] blk_alloc_queue_node+0x7b6/0xbd0 [ 2935.601000] blk_mq_init_queue+0x44/0xa0 [ 2935.605635] loop_add+0x2cb/0x8a0 [ 2935.609106] loop_control_ioctl+0x16c/0x480 [ 2935.613440] ? loop_lookup+0x1d0/0x1d0 [ 2935.617365] ? ksys_write+0x241/0x2a0 [ 2935.621183] ? loop_lookup+0x1d0/0x1d0 [ 2935.625085] do_vfs_ioctl+0xcdb/0x12e0 [ 2935.628991] ? lock_downgrade+0x720/0x720 [ 2935.633151] ? check_preemption_disabled+0x41/0x280 [ 2935.638180] ? ioctl_preallocate+0x200/0x200 [ 2935.642605] ? __fget+0x356/0x510 [ 2935.646075] ? do_dup2+0x450/0x450 [ 2935.649889] ? vfs_write+0x393/0x540 [ 2935.653619] ? fput+0x2b/0x190 [ 2935.656835] ksys_ioctl+0x9b/0xc0 [ 2935.660328] __x64_sys_ioctl+0x6f/0xb0 [ 2935.664241] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2935.668871] do_syscall_64+0xf9/0x620 [ 2935.672687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2935.677885] RIP: 0033:0x465ef9 [ 2935.681086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:13:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x0, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:42 executing program 5: socketpair(0x1, 0x5, 0xff00, &(0x7f0000000640)) 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x22010000, &(0x7f0000000640)) 15:13:42 executing program 5: socketpair(0x1, 0x5, 0xff01, &(0x7f0000000640)) 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x23000000, &(0x7f0000000640)) 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x23010000, &(0x7f0000000640)) [ 2935.700169] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2935.707890] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2935.715171] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2935.722451] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2935.729736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2935.737302] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x0, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:42 executing program 5: socketpair(0x1, 0x5, 0x20000, &(0x7f0000000640)) 15:13:42 executing program 2 (fault-call:1 fault-nth:23): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:42 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/54, 0x36}], 0x1}, 0x2001) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x24000000, &(0x7f0000000640)) 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x24010000, &(0x7f0000000640)) [ 2935.912016] FAULT_INJECTION: forcing a failure. [ 2935.912016] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.923555] CPU: 0 PID: 31877 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2935.931449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2935.940811] Call Trace: [ 2935.943414] dump_stack+0x1fc/0x2ef [ 2935.947067] should_fail.cold+0xa/0xf [ 2935.950881] ? setup_fault_attr+0x200/0x200 [ 2935.955226] ? rcu_read_lock_sched_held+0x16c/0x1d0 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x25000000, &(0x7f0000000640)) [ 2935.960261] __should_failslab+0x115/0x180 [ 2935.964535] should_failslab+0x5/0x10 [ 2935.968364] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 2935.973420] iolatency_pd_alloc+0x6e/0x120 [ 2935.977667] ? iolatency_pd_init+0x6f0/0x6f0 [ 2935.982100] blkcg_activate_policy+0x249/0x5d0 [ 2935.986788] blk_iolatency_init+0x123/0x2d0 [ 2935.991132] blkcg_init_queue+0x1c1/0x540 [ 2935.995293] blk_alloc_queue_node+0x7b6/0xbd0 [ 2935.999839] blk_mq_init_queue+0x44/0xa0 [ 2936.003945] loop_add+0x2cb/0x8a0 [ 2936.007417] loop_control_ioctl+0x16c/0x480 15:13:42 executing program 1: socketpair(0x1, 0x5, 0x25010000, &(0x7f0000000640)) [ 2936.011754] ? loop_lookup+0x1d0/0x1d0 [ 2936.015837] ? ksys_write+0x241/0x2a0 [ 2936.019919] ? loop_lookup+0x1d0/0x1d0 [ 2936.023823] do_vfs_ioctl+0xcdb/0x12e0 [ 2936.027751] ? lock_downgrade+0x720/0x720 [ 2936.031918] ? check_preemption_disabled+0x41/0x280 [ 2936.036948] ? ioctl_preallocate+0x200/0x200 [ 2936.041379] ? __fget+0x356/0x510 [ 2936.045024] ? do_dup2+0x450/0x450 [ 2936.048584] ? vfs_write+0x393/0x540 [ 2936.052307] ? fput+0x2b/0x190 [ 2936.055519] ksys_ioctl+0x9b/0xc0 [ 2936.058984] __x64_sys_ioctl+0x6f/0xb0 15:13:43 executing program 1: socketpair(0x1, 0x5, 0x26000000, &(0x7f0000000640)) [ 2936.062916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2936.067527] do_syscall_64+0xf9/0x620 [ 2936.071363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2936.076561] RIP: 0033:0x465ef9 [ 2936.079763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2936.098677] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:43 executing program 5: socketpair(0x1, 0x5, 0x200000, &(0x7f0000000640)) 15:13:43 executing program 1: socketpair(0x1, 0x5, 0x26010000, &(0x7f0000000640)) [ 2936.106404] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2936.113689] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2936.120974] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2936.128280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2936.135583] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x0, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:43 executing program 1: socketpair(0x1, 0x5, 0x27000000, &(0x7f0000000640)) 15:13:43 executing program 2 (fault-call:1 fault-nth:24): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:43 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0xe000, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000001c0)={0x36, &(0x7f0000000180)=[{0x0, 0x80, 0x8, 0x5}, {0x5826, 0x8, 0x40, 0x5}]}, 0x10) 15:13:43 executing program 5: socketpair(0x1, 0x5, 0x1000000, &(0x7f0000000640)) 15:13:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2936.335032] FAULT_INJECTION: forcing a failure. [ 2936.335032] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.374833] CPU: 1 PID: 31908 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2936.383008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2936.392369] Call Trace: [ 2936.394972] dump_stack+0x1fc/0x2ef [ 2936.398633] should_fail.cold+0xa/0xf [ 2936.402453] ? setup_fault_attr+0x200/0x200 [ 2936.406799] ? lock_acquire+0x170/0x3c0 [ 2936.410791] __should_failslab+0x115/0x180 [ 2936.415036] should_failslab+0x5/0x10 [ 2936.418840] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2936.423938] blk_throtl_init+0x7c/0x620 [ 2936.427899] ? blk_iolatency_init+0x1b7/0x2d0 [ 2936.432385] blkcg_init_queue+0x1e3/0x540 [ 2936.436526] blk_alloc_queue_node+0x7b6/0xbd0 [ 2936.441022] blk_mq_init_queue+0x44/0xa0 [ 2936.445072] loop_add+0x2cb/0x8a0 [ 2936.448534] loop_control_ioctl+0x16c/0x480 [ 2936.452994] ? loop_lookup+0x1d0/0x1d0 [ 2936.456888] ? ksys_write+0x241/0x2a0 [ 2936.460683] ? loop_lookup+0x1d0/0x1d0 [ 2936.464571] do_vfs_ioctl+0xcdb/0x12e0 [ 2936.469005] ? lock_downgrade+0x720/0x720 [ 2936.473152] ? check_preemption_disabled+0x41/0x280 [ 2936.478215] ? ioctl_preallocate+0x200/0x200 [ 2936.482793] ? __fget+0x356/0x510 [ 2936.486233] ? do_dup2+0x450/0x450 [ 2936.489768] ? vfs_write+0x393/0x540 [ 2936.493467] ? fput+0x2b/0x190 [ 2936.496653] ksys_ioctl+0x9b/0xc0 [ 2936.500094] __x64_sys_ioctl+0x6f/0xb0 [ 2936.503969] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2936.508571] do_syscall_64+0xf9/0x620 [ 2936.512378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2936.517566] RIP: 0033:0x465ef9 15:13:43 executing program 5: socketpair(0x1, 0x5, 0x1010000, &(0x7f0000000640)) 15:13:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x0, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:43 executing program 1: socketpair(0x1, 0x5, 0x27010000, &(0x7f0000000640)) 15:13:43 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x40000, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000100)={0x0, 0x6, 0x0, &(0x7f00000000c0)=0x3}) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000001c0)=0x80) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x4}, &(0x7f0000000240)=0x8) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x90000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x200, 0x0) 15:13:43 executing program 2 (fault-call:1 fault-nth:25): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) [ 2936.520768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2936.540099] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2936.547798] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2936.555098] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2936.562362] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2936.569627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2936.576896] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:43 executing program 5: socketpair(0x1, 0x5, 0x2000000, &(0x7f0000000640)) 15:13:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:43 executing program 1: socketpair(0x1, 0x5, 0x28000000, &(0x7f0000000640)) 15:13:43 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x800, @mcast2, 0xffffddd4}}, 0x4, 0x4, 0xfffffff9, 0x9, 0x5}, &(0x7f00000001c0)=0x98) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x0, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2936.746812] FAULT_INJECTION: forcing a failure. [ 2936.746812] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.808864] CPU: 0 PID: 31930 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2936.816827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2936.826184] Call Trace: [ 2936.828789] dump_stack+0x1fc/0x2ef [ 2936.832426] should_fail.cold+0xa/0xf [ 2936.836236] ? setup_fault_attr+0x200/0x200 [ 2936.840572] ? lock_acquire+0x170/0x3c0 [ 2936.844594] __should_failslab+0x115/0x180 [ 2936.848847] should_failslab+0x5/0x10 [ 2936.852660] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2936.857841] ? throtl_add_bio_tg+0x1f0/0x1f0 [ 2936.862269] throtl_pd_alloc+0x6b/0x940 [ 2936.866379] ? throtl_add_bio_tg+0x1f0/0x1f0 [ 2936.870829] blkcg_activate_policy+0x120/0x5d0 [ 2936.875434] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2936.880467] ? init_timer_key+0x88/0x350 [ 2936.884683] blk_throtl_init+0x40d/0x620 [ 2936.888760] ? blk_iolatency_init+0x1b7/0x2d0 [ 2936.893275] blkcg_init_queue+0x1e3/0x540 [ 2936.897528] blk_alloc_queue_node+0x7b6/0xbd0 [ 2936.902082] blk_mq_init_queue+0x44/0xa0 [ 2936.906154] loop_add+0x2cb/0x8a0 [ 2936.909633] loop_control_ioctl+0x16c/0x480 [ 2936.913962] ? loop_lookup+0x1d0/0x1d0 [ 2936.917871] ? ksys_write+0x241/0x2a0 [ 2936.921672] ? loop_lookup+0x1d0/0x1d0 [ 2936.925571] do_vfs_ioctl+0xcdb/0x12e0 [ 2936.929476] ? lock_downgrade+0x720/0x720 [ 2936.933674] ? check_preemption_disabled+0x41/0x280 [ 2936.938715] ? ioctl_preallocate+0x200/0x200 [ 2936.943175] ? __fget+0x356/0x510 [ 2936.946671] ? do_dup2+0x450/0x450 [ 2936.950301] ? vfs_write+0x393/0x540 [ 2936.954029] ? fput+0x2b/0x190 [ 2936.957235] ksys_ioctl+0x9b/0xc0 [ 2936.960692] __x64_sys_ioctl+0x6f/0xb0 [ 2936.964759] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2936.969343] do_syscall_64+0xf9/0x620 [ 2936.973170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2936.978525] RIP: 0033:0x465ef9 [ 2936.981723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2937.000639] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:43 executing program 5: socketpair(0x1, 0x5, 0x2010000, &(0x7f0000000640)) 15:13:43 executing program 1: socketpair(0x1, 0x5, 0x28010000, &(0x7f0000000640)) [ 2937.008372] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2937.015652] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2937.022927] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2937.030205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2937.037486] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:44 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xe753, 0x200000) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) read$FUSE(r0, &(0x7f0000000a40)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x0, 0xfffffffffffffff8, 0x8, 0x800, 0x5, {0x1, 0x4f2, 0x7, 0x8, 0x4, 0x0, 0x7fffffff, 0x8, 0x1, 0x1000, 0x0, 0xee00, 0xee00, 0x0, 0x95c}}, {0x0, 0x2}}}, 0xa0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000002a80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000200)={0x60, 0xfffffffffffffffe, r3, {{0xb034, 0x1a7, 0x0, 0xb21, 0x679, 0x0, 0x8000, 0x7}}}, 0x60) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0xfffffffffffffffc, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000100)={0x1, r4}) 15:13:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:44 executing program 1: socketpair(0x1, 0x5, 0x29000000, &(0x7f0000000640)) 15:13:44 executing program 2 (fault-call:1 fault-nth:26): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x3000000, &(0x7f0000000640)) [ 2937.226813] FAULT_INJECTION: forcing a failure. [ 2937.226813] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.238070] CPU: 1 PID: 31954 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2937.245965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2937.255327] Call Trace: [ 2937.257934] dump_stack+0x1fc/0x2ef [ 2937.261578] should_fail.cold+0xa/0xf [ 2937.265398] ? setup_fault_attr+0x200/0x200 [ 2937.269730] ? lock_acquire+0x170/0x3c0 [ 2937.273730] ? check_preemption_disabled+0x41/0x280 [ 2937.278756] __should_failslab+0x115/0x180 [ 2937.283002] should_failslab+0x5/0x10 [ 2937.286812] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 2937.291841] throtl_pd_alloc+0x6b/0x940 [ 2937.295831] ? throtl_add_bio_tg+0x1f0/0x1f0 [ 2937.300258] blkcg_activate_policy+0x249/0x5d0 [ 2937.304881] blk_throtl_init+0x40d/0x620 [ 2937.308944] ? blk_iolatency_init+0x1b7/0x2d0 [ 2937.313454] blkcg_init_queue+0x1e3/0x540 [ 2937.317621] blk_alloc_queue_node+0x7b6/0xbd0 [ 2937.322133] blk_mq_init_queue+0x44/0xa0 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x3010000, &(0x7f0000000640)) 15:13:44 executing program 1: socketpair(0x1, 0x5, 0x29010000, &(0x7f0000000640)) 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x4000000, &(0x7f0000000640)) 15:13:44 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x80d80, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x2000, 0x0) ioctl$CHAR_RAW_IOMIN(r1, 0x1278, &(0x7f00000001c0)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000040)={0x1}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x8002, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x2], 0x1, 0x1800}) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x410800, 0x0) ioctl$CHAR_RAW_ALIGNOFF(r4, 0x127a, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x4010000, &(0x7f0000000640)) [ 2937.326208] loop_add+0x2cb/0x8a0 [ 2937.329703] loop_control_ioctl+0x16c/0x480 [ 2937.334031] ? loop_lookup+0x1d0/0x1d0 [ 2937.337959] ? ksys_write+0x241/0x2a0 [ 2937.341771] ? loop_lookup+0x1d0/0x1d0 [ 2937.345667] do_vfs_ioctl+0xcdb/0x12e0 [ 2937.349741] ? lock_downgrade+0x720/0x720 [ 2937.353910] ? check_preemption_disabled+0x41/0x280 [ 2937.358947] ? ioctl_preallocate+0x200/0x200 [ 2937.363379] ? __fget+0x356/0x510 [ 2937.366860] ? do_dup2+0x450/0x450 [ 2937.370412] ? vfs_write+0x393/0x540 [ 2937.374140] ? fput+0x2b/0x190 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x5000000, &(0x7f0000000640)) [ 2937.377356] ksys_ioctl+0x9b/0xc0 [ 2937.380820] __x64_sys_ioctl+0x6f/0xb0 [ 2937.384715] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2937.389305] do_syscall_64+0xf9/0x620 [ 2937.393133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2937.398332] RIP: 0033:0x465ef9 [ 2937.401532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x5010000, &(0x7f0000000640)) [ 2937.420448] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2937.428180] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2937.435458] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2937.442736] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2937.450023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2937.457572] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x0, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:44 executing program 2 (fault-call:1 fault-nth:27): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:44 executing program 1: socketpair(0x1, 0x5, 0x2a000000, &(0x7f0000000640)) 15:13:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:44 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x42, 0x0) 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x6000000, &(0x7f0000000640)) 15:13:44 executing program 1: socketpair(0x1, 0x5, 0x2a010000, &(0x7f0000000640)) [ 2937.649217] FAULT_INJECTION: forcing a failure. [ 2937.649217] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.679727] CPU: 1 PID: 31985 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2937.687653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2937.697105] Call Trace: 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x6010000, &(0x7f0000000640)) 15:13:44 executing program 1: socketpair(0x1, 0x5, 0x2b000000, &(0x7f0000000640)) [ 2937.699713] dump_stack+0x1fc/0x2ef [ 2937.703352] should_fail.cold+0xa/0xf [ 2937.707201] ? setup_fault_attr+0x200/0x200 [ 2937.711544] ? lock_acquire+0x170/0x3c0 [ 2937.715531] __should_failslab+0x115/0x180 [ 2937.719780] should_failslab+0x5/0x10 [ 2937.723594] kmem_cache_alloc_trace+0x284/0x380 [ 2937.728374] ? blk_mq_hctx_mark_pending+0x1f0/0x1f0 [ 2937.733402] ? plug_ctx_cmp+0x100/0x100 [ 2937.737388] blk_stat_alloc_callback+0x54/0x290 [ 2937.742091] blk_mq_init_allocated_queue+0x80/0x1300 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x7000000, &(0x7f0000000640)) [ 2937.747206] ? blkcg_init_queue+0x1fd/0x540 [ 2937.751634] ? blk_alloc_queue_node+0x7ca/0xbd0 [ 2937.756322] blk_mq_init_queue+0x5c/0xa0 [ 2937.760575] loop_add+0x2cb/0x8a0 [ 2937.764042] loop_control_ioctl+0x16c/0x480 [ 2937.768374] ? loop_lookup+0x1d0/0x1d0 [ 2937.772284] ? ksys_write+0x241/0x2a0 [ 2937.776100] ? loop_lookup+0x1d0/0x1d0 [ 2937.780005] do_vfs_ioctl+0xcdb/0x12e0 [ 2937.784168] ? lock_downgrade+0x720/0x720 [ 2937.788334] ? check_preemption_disabled+0x41/0x280 [ 2937.793382] ? ioctl_preallocate+0x200/0x200 15:13:44 executing program 1: socketpair(0x1, 0x5, 0x2b010000, &(0x7f0000000640)) [ 2937.797812] ? __fget+0x356/0x510 [ 2937.801474] ? do_dup2+0x450/0x450 [ 2937.805029] ? vfs_write+0x393/0x540 [ 2937.808785] ? fput+0x2b/0x190 [ 2937.812004] ksys_ioctl+0x9b/0xc0 [ 2937.815471] __x64_sys_ioctl+0x6f/0xb0 [ 2937.819372] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2937.823994] do_syscall_64+0xf9/0x620 [ 2937.828067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2937.833267] RIP: 0033:0x465ef9 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x7010000, &(0x7f0000000640)) [ 2937.836465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2937.855377] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2937.867356] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2937.875768] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2937.883228] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2937.890597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2937.897879] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x0, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:44 executing program 2 (fault-call:1 fault-nth:28): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:44 executing program 1: socketpair(0x1, 0x5, 0x2c000000, &(0x7f0000000640)) 15:13:44 executing program 5: socketpair(0x1, 0x5, 0x8000000, &(0x7f0000000640)) 15:13:44 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r0, 0x7b1, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000380)={{@host}, @any, 0x0, 0x100, 0x7fffffff, 0x4c, 0x100000001, 0x9, 0x6}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0x2fffbffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x5, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000000c0)={r1, 0x6}) socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000240)=@req={0x6, 0x3ff, 0x1000, 0xdd}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) r3 = accept$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[{0xfa9, 0xb2, 0x26, 0x20}, {0x2, 0x0, 0x80, 0x3}, {0x8, 0x0, 0x20}]}, 0x10) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000002c0)={0x0, r1}) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvram\x00', 0x200200, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r5, 0xc00464c9, &(0x7f0000000340)) sendmsg$can_raw(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x1d, r4}, 0x10, &(0x7f0000000180)={0x0, 0x3e}, 0x1, 0x0, 0x0, 0x84}, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000280)={'tunl0\x00'}) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x1) [ 2938.065582] FAULT_INJECTION: forcing a failure. [ 2938.065582] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.087545] CPU: 0 PID: 32010 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2938.095473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2938.104839] Call Trace: [ 2938.107443] dump_stack+0x1fc/0x2ef [ 2938.111096] should_fail.cold+0xa/0xf [ 2938.114913] ? setup_fault_attr+0x200/0x200 [ 2938.119254] ? lock_acquire+0x170/0x3c0 [ 2938.123254] __should_failslab+0x115/0x180 [ 2938.127558] should_failslab+0x5/0x10 [ 2938.131374] __kmalloc+0x2ab/0x3c0 [ 2938.134930] ? blk_stat_alloc_callback+0x81/0x290 [ 2938.139822] ? blk_mq_hctx_mark_pending+0x1f0/0x1f0 [ 2938.144845] ? plug_ctx_cmp+0x100/0x100 [ 2938.148834] blk_stat_alloc_callback+0x81/0x290 [ 2938.153525] blk_mq_init_allocated_queue+0x80/0x1300 [ 2938.158647] ? blkcg_init_queue+0x1fd/0x540 [ 2938.163002] ? blk_alloc_queue_node+0x7ca/0xbd0 [ 2938.167678] blk_mq_init_queue+0x5c/0xa0 [ 2938.171850] loop_add+0x2cb/0x8a0 [ 2938.175577] loop_control_ioctl+0x16c/0x480 [ 2938.179918] ? loop_lookup+0x1d0/0x1d0 [ 2938.183822] ? ksys_write+0x241/0x2a0 [ 2938.187624] ? loop_lookup+0x1d0/0x1d0 [ 2938.191514] do_vfs_ioctl+0xcdb/0x12e0 [ 2938.195407] ? lock_downgrade+0x720/0x720 [ 2938.199582] ? check_preemption_disabled+0x41/0x280 [ 2938.204616] ? ioctl_preallocate+0x200/0x200 [ 2938.209040] ? __fget+0x356/0x510 [ 2938.212484] ? do_dup2+0x450/0x450 [ 2938.216013] ? vfs_write+0x393/0x540 [ 2938.219754] ? fput+0x2b/0x190 [ 2938.222966] ksys_ioctl+0x9b/0xc0 [ 2938.226458] __x64_sys_ioctl+0x6f/0xb0 [ 2938.230349] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2938.235007] do_syscall_64+0xf9/0x620 [ 2938.239001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2938.244179] RIP: 0033:0x465ef9 15:13:45 executing program 5: socketpair(0x1, 0x5, 0x8010000, &(0x7f0000000640)) 15:13:45 executing program 1: socketpair(0x1, 0x5, 0x2c010000, &(0x7f0000000640)) 15:13:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x0, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2938.247901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2938.266816] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2938.274536] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2938.281808] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2938.289175] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2938.296482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2938.303850] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:45 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x88100, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 15:13:45 executing program 5: socketpair(0x1, 0x5, 0x9000000, &(0x7f0000000640)) 15:13:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x0, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:45 executing program 2 (fault-call:1 fault-nth:29): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:45 executing program 1: socketpair(0x1, 0x5, 0x2d000000, &(0x7f0000000640)) 15:13:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x0, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:45 executing program 5: socketpair(0x1, 0x5, 0x9010000, &(0x7f0000000640)) [ 2938.484299] FAULT_INJECTION: forcing a failure. [ 2938.484299] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.512195] CPU: 0 PID: 32031 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2938.520868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2938.530238] Call Trace: 15:13:45 executing program 5: socketpair(0x1, 0x5, 0xa000000, &(0x7f0000000640)) [ 2938.532863] dump_stack+0x1fc/0x2ef [ 2938.536511] should_fail.cold+0xa/0xf [ 2938.540359] ? setup_fault_attr+0x200/0x200 [ 2938.544957] ? lock_acquire+0x170/0x3c0 [ 2938.548949] __should_failslab+0x115/0x180 [ 2938.553198] should_failslab+0x5/0x10 [ 2938.557011] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2938.562170] __kmalloc_node+0x38/0x70 [ 2938.566021] blk_mq_init_allocated_queue+0x178/0x1300 [ 2938.571226] ? blkcg_init_queue+0x1fd/0x540 [ 2938.575572] blk_mq_init_queue+0x5c/0xa0 [ 2938.579646] loop_add+0x2cb/0x8a0 15:13:45 executing program 5: socketpair(0x1, 0x5, 0xa010000, &(0x7f0000000640)) [ 2938.583122] loop_control_ioctl+0x16c/0x480 [ 2938.587456] ? loop_lookup+0x1d0/0x1d0 [ 2938.591361] ? ksys_write+0x241/0x2a0 [ 2938.595172] ? loop_lookup+0x1d0/0x1d0 [ 2938.599073] do_vfs_ioctl+0xcdb/0x12e0 [ 2938.602984] ? lock_downgrade+0x720/0x720 [ 2938.607146] ? check_preemption_disabled+0x41/0x280 [ 2938.612168] ? ioctl_preallocate+0x200/0x200 [ 2938.616585] ? __fget+0x356/0x510 [ 2938.620047] ? do_dup2+0x450/0x450 [ 2938.623601] ? vfs_write+0x393/0x540 [ 2938.627327] ? fput+0x2b/0x190 [ 2938.630625] ksys_ioctl+0x9b/0xc0 15:13:45 executing program 5: socketpair(0x1, 0x5, 0xb000000, &(0x7f0000000640)) [ 2938.634820] __x64_sys_ioctl+0x6f/0xb0 [ 2938.638716] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2938.643301] do_syscall_64+0xf9/0x620 [ 2938.647135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2938.652329] RIP: 0033:0x465ef9 [ 2938.656223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2938.675130] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:45 executing program 1: socketpair(0x1, 0x5, 0x2d010000, &(0x7f0000000640)) [ 2938.682855] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2938.690165] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2938.697444] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2938.705073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2938.712382] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x0, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:45 executing program 2 (fault-call:1 fault-nth:30): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x0, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:45 executing program 5: socketpair(0x1, 0x5, 0xb010000, &(0x7f0000000640)) 15:13:45 executing program 1: socketpair(0x1, 0x5, 0x2e000000, &(0x7f0000000640)) 15:13:45 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x7ff, 0x141300) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000080)={0x0, 0x3}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x0, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2938.962356] FAULT_INJECTION: forcing a failure. [ 2938.962356] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.997611] CPU: 1 PID: 32068 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2939.005825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.015190] Call Trace: [ 2939.017801] dump_stack+0x1fc/0x2ef [ 2939.021476] should_fail.cold+0xa/0xf [ 2939.025416] ? setup_fault_attr+0x200/0x200 [ 2939.029744] ? __mutex_add_waiter+0x160/0x160 [ 2939.034231] __should_failslab+0x115/0x180 [ 2939.038465] should_failslab+0x5/0x10 [ 2939.042265] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2939.047372] __kmalloc_node+0x38/0x70 [ 2939.051171] blk_mq_realloc_hw_ctxs+0x1d8/0x1000 [ 2939.055919] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 2939.061222] blk_mq_init_allocated_queue+0x20c/0x1300 [ 2939.066426] ? blkcg_init_queue+0x1fd/0x540 [ 2939.070750] blk_mq_init_queue+0x5c/0xa0 [ 2939.074813] loop_add+0x2cb/0x8a0 [ 2939.078279] loop_control_ioctl+0x16c/0x480 [ 2939.082604] ? loop_lookup+0x1d0/0x1d0 [ 2939.086494] ? ksys_write+0x241/0x2a0 [ 2939.090288] ? loop_lookup+0x1d0/0x1d0 [ 2939.094254] do_vfs_ioctl+0xcdb/0x12e0 [ 2939.098247] ? lock_downgrade+0x720/0x720 [ 2939.102383] ? check_preemption_disabled+0x41/0x280 [ 2939.107398] ? ioctl_preallocate+0x200/0x200 [ 2939.111818] ? __fget+0x356/0x510 [ 2939.115271] ? do_dup2+0x450/0x450 [ 2939.118811] ? vfs_write+0x393/0x540 [ 2939.122515] ? fput+0x2b/0x190 [ 2939.125709] ksys_ioctl+0x9b/0xc0 [ 2939.129171] __x64_sys_ioctl+0x6f/0xb0 [ 2939.134106] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2939.138768] do_syscall_64+0xf9/0x620 [ 2939.142568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.147758] RIP: 0033:0x465ef9 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x2e010000, &(0x7f0000000640)) 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xc000000, &(0x7f0000000640)) [ 2939.150949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.169926] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2939.177643] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2939.184910] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2939.192193] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.199448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:13:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x0, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xc010000, &(0x7f0000000640)) [ 2939.206717] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:46 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x31d441, 0x0) 15:13:46 executing program 2 (fault-call:1 fault-nth:31): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x0, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x2f000000, &(0x7f0000000640)) 15:13:46 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x1e, "56c89001bdac1c227f9eadb7f59022ff54aee460e756aca4d227e8c02feb"}, &(0x7f00000000c0)=0x26) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={r0, @in6={{0xa, 0x4e24, 0x0, @empty, 0x9}}, 0x1f, 0x7ef, 0x3, 0x9, 0x2}, &(0x7f00000001c0)=0x98) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xd000000, &(0x7f0000000640)) [ 2939.399717] FAULT_INJECTION: forcing a failure. [ 2939.399717] name failslab, interval 1, probability 0, space 0, times 0 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x2f010000, &(0x7f0000000640)) [ 2939.453851] CPU: 0 PID: 32087 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2939.461776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.471179] Call Trace: [ 2939.473778] dump_stack+0x1fc/0x2ef [ 2939.477419] should_fail.cold+0xa/0xf [ 2939.481233] ? setup_fault_attr+0x200/0x200 [ 2939.485566] ? __debug_object_init+0x410/0x9b0 [ 2939.490176] __should_failslab+0x115/0x180 [ 2939.494424] should_failslab+0x5/0x10 [ 2939.498253] kmem_cache_alloc_node_trace+0x244/0x3b0 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x30000000, &(0x7f0000000640)) [ 2939.503370] __kmalloc_node+0x38/0x70 [ 2939.507203] blk_mq_realloc_hw_ctxs+0x568/0x1000 [ 2939.512069] blk_mq_init_allocated_queue+0x20c/0x1300 [ 2939.517279] ? blkcg_init_queue+0x1fd/0x540 [ 2939.521635] blk_mq_init_queue+0x5c/0xa0 [ 2939.525719] loop_add+0x2cb/0x8a0 [ 2939.529208] loop_control_ioctl+0x16c/0x480 [ 2939.533543] ? loop_lookup+0x1d0/0x1d0 [ 2939.537451] ? ksys_write+0x241/0x2a0 [ 2939.541263] ? loop_lookup+0x1d0/0x1d0 [ 2939.545177] do_vfs_ioctl+0xcdb/0x12e0 [ 2939.549073] ? lock_downgrade+0x720/0x720 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x30010000, &(0x7f0000000640)) [ 2939.553252] ? check_preemption_disabled+0x41/0x280 [ 2939.558282] ? ioctl_preallocate+0x200/0x200 [ 2939.562710] ? __fget+0x356/0x510 [ 2939.566186] ? do_dup2+0x450/0x450 [ 2939.569734] ? vfs_write+0x393/0x540 [ 2939.573492] ? fput+0x2b/0x190 [ 2939.576708] ksys_ioctl+0x9b/0xc0 [ 2939.580183] __x64_sys_ioctl+0x6f/0xb0 [ 2939.584083] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2939.588679] do_syscall_64+0xf9/0x620 [ 2939.592494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.597688] RIP: 0033:0x465ef9 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x31000000, &(0x7f0000000640)) 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xd010000, &(0x7f0000000640)) [ 2939.600916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.619829] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2939.627903] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2939.635207] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2939.642484] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.649759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2939.657036] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:46 executing program 2 (fault-call:1 fault-nth:32): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x31010000, &(0x7f0000000640)) 15:13:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x0, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:46 executing program 3: setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100)=0x1000, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x28) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) 15:13:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xe000000, &(0x7f0000000640)) [ 2939.791108] FAULT_INJECTION: forcing a failure. [ 2939.791108] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.806146] CPU: 1 PID: 32117 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2939.814059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.823429] Call Trace: [ 2939.826041] dump_stack+0x1fc/0x2ef [ 2939.829684] should_fail.cold+0xa/0xf [ 2939.833762] ? setup_fault_attr+0x200/0x200 [ 2939.838176] ? should_fail+0x142/0x7b0 [ 2939.842721] __should_failslab+0x115/0x180 [ 2939.846976] should_failslab+0x5/0x10 [ 2939.850815] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2939.856029] __kmalloc_node+0x38/0x70 [ 2939.859854] sbitmap_init_node+0x123/0x440 [ 2939.864106] blk_mq_realloc_hw_ctxs+0x5db/0x1000 [ 2939.868893] blk_mq_init_allocated_queue+0x20c/0x1300 [ 2939.874098] ? blkcg_init_queue+0x1fd/0x540 [ 2939.878456] blk_mq_init_queue+0x5c/0xa0 [ 2939.882533] loop_add+0x2cb/0x8a0 [ 2939.886009] loop_control_ioctl+0x16c/0x480 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xe010000, &(0x7f0000000640)) 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xf000000, &(0x7f0000000640)) [ 2939.890344] ? loop_lookup+0x1d0/0x1d0 [ 2939.894247] ? ksys_write+0x241/0x2a0 [ 2939.898192] ? loop_lookup+0x1d0/0x1d0 [ 2939.902097] do_vfs_ioctl+0xcdb/0x12e0 [ 2939.906006] ? lock_downgrade+0x720/0x720 [ 2939.910165] ? check_preemption_disabled+0x41/0x280 [ 2939.915197] ? ioctl_preallocate+0x200/0x200 [ 2939.919624] ? __fget+0x356/0x510 [ 2939.923092] ? do_dup2+0x450/0x450 [ 2939.926640] ? vfs_write+0x393/0x540 [ 2939.930399] ? fput+0x2b/0x190 [ 2939.933623] ksys_ioctl+0x9b/0xc0 [ 2939.937110] __x64_sys_ioctl+0x6f/0xb0 15:13:46 executing program 5: socketpair(0x1, 0x5, 0xf010000, &(0x7f0000000640)) 15:13:46 executing program 5: socketpair(0x1, 0x5, 0x10000000, &(0x7f0000000640)) [ 2939.941100] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2939.945698] do_syscall_64+0xf9/0x620 [ 2939.949518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.954736] RIP: 0033:0x465ef9 [ 2939.957967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.976886] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2939.984635] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 15:13:46 executing program 1: socketpair(0x1, 0x5, 0x32000000, &(0x7f0000000640)) 15:13:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x0, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 2 (fault-call:1 fault-nth:33): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) [ 2939.991912] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2939.999191] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2940.006466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2940.013741] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x32010000, &(0x7f0000000640)) 15:13:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x0, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000001c0)={0x1ff, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000200)={0xffffffff, r2}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x3, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x81, 0x80000000, {"1040ac56bf783f130f90b3d811f10a4d"}, 0xb8f, 0xa22, 0xffffffff}}}, 0xa0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000003c0)=""/137) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="01ff000000000000000004000000"], 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r5, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7ff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6e0c}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfbec, 0x9, 0x7fffffff, 0x6]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1003}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4a}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffbff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x24018851}, 0x4001) connect$packet(r1, &(0x7f0000000080)={0x11, 0xf6, 0x0, 0x1, 0x7, 0x6, @local}, 0x14) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x0, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x33000000, &(0x7f0000000640)) [ 2940.165126] FAULT_INJECTION: forcing a failure. [ 2940.165126] name failslab, interval 1, probability 0, space 0, times 0 [ 2940.200622] CPU: 0 PID: 32142 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x33010000, &(0x7f0000000640)) [ 2940.208561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2940.218631] Call Trace: [ 2940.221238] dump_stack+0x1fc/0x2ef [ 2940.225407] should_fail.cold+0xa/0xf [ 2940.229219] ? should_fail+0x142/0x7b0 [ 2940.233125] ? setup_fault_attr+0x200/0x200 [ 2940.237465] __should_failslab+0x115/0x180 [ 2940.241740] should_failslab+0x5/0x10 [ 2940.245550] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2940.250669] blk_alloc_flush_queue+0x76/0x300 [ 2940.255179] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 [ 2940.259977] blk_mq_init_allocated_queue+0x20c/0x1300 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x34000000, &(0x7f0000000640)) [ 2940.265227] ? blkcg_init_queue+0x1fd/0x540 [ 2940.269574] blk_mq_init_queue+0x5c/0xa0 [ 2940.273650] loop_add+0x2cb/0x8a0 [ 2940.277117] loop_control_ioctl+0x16c/0x480 [ 2940.281451] ? loop_lookup+0x1d0/0x1d0 [ 2940.285355] ? ksys_write+0x241/0x2a0 [ 2940.289164] ? loop_lookup+0x1d0/0x1d0 [ 2940.293069] do_vfs_ioctl+0xcdb/0x12e0 [ 2940.298096] ? lock_downgrade+0x720/0x720 [ 2940.302271] ? check_preemption_disabled+0x41/0x280 [ 2940.307300] ? ioctl_preallocate+0x200/0x200 [ 2940.311756] ? __fget+0x356/0x510 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x34010000, &(0x7f0000000640)) [ 2940.315225] ? do_dup2+0x450/0x450 [ 2940.318781] ? vfs_write+0x393/0x540 [ 2940.322512] ? fput+0x2b/0x190 [ 2940.325903] ksys_ioctl+0x9b/0xc0 [ 2940.329366] __x64_sys_ioctl+0x6f/0xb0 [ 2940.333332] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2940.337943] do_syscall_64+0xf9/0x620 [ 2940.341864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2940.347061] RIP: 0033:0x465ef9 15:13:47 executing program 5: socketpair(0x1, 0x5, 0x10010000, &(0x7f0000000640)) 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x35000000, &(0x7f0000000640)) 15:13:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x0, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2940.350267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2940.369186] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2940.377172] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2940.384451] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2940.391824] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2940.400016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2940.407407] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:47 executing program 2 (fault-call:1 fault-nth:34): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x0, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000100)={0x90, 0x0, 0x0, {0x1, 0x0, 0x1, 0x10000, 0x9, 0x8, {0x4, 0x1, 0x5, 0x3, 0x3f, 0x7, 0x1, 0x1, 0xc57, 0x6000, 0x6c4f9d42, 0x0, 0xee00, 0x1, 0x9b0}}}, 0x90) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x2a8843, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000080)={0x0, 0x9}) 15:13:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x0, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x5, 0x1, 0x6], 0x3, 0x800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000100)={0x0, 0x7f}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x5, 0x7, 0x4009, 0x9], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) 15:13:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x0, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 5: socketpair(0x1, 0x5, 0x11000000, &(0x7f0000000640)) 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x35010000, &(0x7f0000000640)) [ 2940.603671] FAULT_INJECTION: forcing a failure. [ 2940.603671] name failslab, interval 1, probability 0, space 0, times 0 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x36000000, &(0x7f0000000640)) [ 2940.643853] CPU: 0 PID: 32169 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2940.651874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2940.661236] Call Trace: [ 2940.663881] dump_stack+0x1fc/0x2ef [ 2940.667557] should_fail.cold+0xa/0xf [ 2940.671460] ? setup_fault_attr+0x200/0x200 [ 2940.675807] ? should_fail+0x142/0x7b0 [ 2940.679708] __should_failslab+0x115/0x180 [ 2940.683992] should_failslab+0x5/0x10 [ 2940.687837] kmem_cache_alloc_node_trace+0x244/0x3b0 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x36010000, &(0x7f0000000640)) [ 2940.692963] __kmalloc_node+0x38/0x70 [ 2940.696781] blk_alloc_flush_queue+0x120/0x300 [ 2940.701409] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 [ 2940.706288] blk_mq_init_allocated_queue+0x20c/0x1300 [ 2940.711495] ? blkcg_init_queue+0x1fd/0x540 [ 2940.715995] blk_mq_init_queue+0x5c/0xa0 [ 2940.720193] loop_add+0x2cb/0x8a0 [ 2940.723671] loop_control_ioctl+0x16c/0x480 [ 2940.728633] ? loop_lookup+0x1d0/0x1d0 [ 2940.732560] ? ksys_write+0x241/0x2a0 [ 2940.736369] ? loop_lookup+0x1d0/0x1d0 [ 2940.740267] do_vfs_ioctl+0xcdb/0x12e0 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x37000000, &(0x7f0000000640)) [ 2940.744175] ? lock_downgrade+0x720/0x720 [ 2940.749122] ? check_preemption_disabled+0x41/0x280 [ 2940.754160] ? ioctl_preallocate+0x200/0x200 [ 2940.758600] ? __fget+0x356/0x510 [ 2940.762100] ? do_dup2+0x450/0x450 [ 2940.765653] ? vfs_write+0x393/0x540 [ 2940.769409] ? fput+0x2b/0x190 [ 2940.772625] ksys_ioctl+0x9b/0xc0 [ 2940.776118] __x64_sys_ioctl+0x6f/0xb0 [ 2940.780130] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2940.785168] do_syscall_64+0xf9/0x620 [ 2940.789175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2940.794376] RIP: 0033:0x465ef9 [ 2940.797583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2940.816820] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2940.824645] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2940.831934] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 15:13:47 executing program 5: socketpair(0x1, 0x5, 0x11010000, &(0x7f0000000640)) [ 2940.840358] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2940.847639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2940.854941] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:47 executing program 2 (fault-call:1 fault-nth:35): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:47 executing program 1: socketpair(0x1, 0x5, 0x37010000, &(0x7f0000000640)) 15:13:47 executing program 5: socketpair(0x1, 0x5, 0x12000000, &(0x7f0000000640)) 15:13:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x0, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:47 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000080)={0x10000000ffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x262000, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2941.010094] FAULT_INJECTION: forcing a failure. [ 2941.010094] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.024830] CPU: 1 PID: 32197 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2941.032749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.042135] Call Trace: [ 2941.044745] dump_stack+0x1fc/0x2ef [ 2941.048409] should_fail.cold+0xa/0xf [ 2941.052225] ? setup_fault_attr+0x200/0x200 15:13:47 executing program 5: socketpair(0x1, 0x5, 0x12010000, &(0x7f0000000640)) 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x13000000, &(0x7f0000000640)) 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x13010000, &(0x7f0000000640)) [ 2941.056563] ? lock_acquire+0x170/0x3c0 [ 2941.060985] __should_failslab+0x115/0x180 [ 2941.066450] should_failslab+0x5/0x10 [ 2941.070268] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2941.075401] blk_mq_init_tags+0x6a/0x2b0 [ 2941.079482] blk_mq_alloc_rq_map+0x9d/0x230 [ 2941.083990] ? elevator_get+0x29/0x170 [ 2941.087996] blk_mq_init_sched+0x219/0x730 [ 2941.092338] elevator_init_mq+0xf0/0x180 [ 2941.096412] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2941.101646] blk_mq_init_queue+0x5c/0xa0 [ 2941.105745] loop_add+0x2cb/0x8a0 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x14000000, &(0x7f0000000640)) [ 2941.109218] loop_control_ioctl+0x16c/0x480 [ 2941.113550] ? loop_lookup+0x1d0/0x1d0 [ 2941.117453] ? ksys_write+0x241/0x2a0 [ 2941.121273] ? loop_lookup+0x1d0/0x1d0 [ 2941.125225] do_vfs_ioctl+0xcdb/0x12e0 [ 2941.129127] ? lock_downgrade+0x720/0x720 [ 2941.133284] ? check_preemption_disabled+0x41/0x280 [ 2941.138313] ? ioctl_preallocate+0x200/0x200 [ 2941.142743] ? __fget+0x356/0x510 [ 2941.146217] ? do_dup2+0x450/0x450 [ 2941.149766] ? vfs_write+0x393/0x540 [ 2941.153490] ? fput+0x2b/0x190 [ 2941.156739] ksys_ioctl+0x9b/0xc0 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x14010000, &(0x7f0000000640)) [ 2941.160210] __x64_sys_ioctl+0x6f/0xb0 [ 2941.164372] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2941.169073] do_syscall_64+0xf9/0x620 [ 2941.172903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2941.178192] RIP: 0033:0x465ef9 [ 2941.181404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2941.200754] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:48 executing program 1: socketpair(0x1, 0x5, 0x38000000, &(0x7f0000000640)) 15:13:48 executing program 2 (fault-call:1 fault-nth:36): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x15000000, &(0x7f0000000640)) [ 2941.208477] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2941.215765] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2941.223050] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2941.230338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2941.237625] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x0, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:48 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000080)={0x0, 0x2000}, 0xfffffffffffffff5) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x71, "4e635cb850783054ed9d37fbe2f6938bee752790022c2f0a7a2a3c19a58be5b48455c57a38e0ee4aafbdd8326708cc6fee768675583a1462f77f77611e6b148ebb3f971a31ab3572a8c16a02c40da08d2f78ddfcad62954d70d0ad523cd5e059d3346e802d6d7d320de8d72f751cb4721c"}, &(0x7f0000000140)=0x79) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r2, @in={{0x2, 0x4e20, @local}}, 0xb, 0x401, 0x8, 0x1, 0xe5, 0x8}, 0x9c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 15:13:48 executing program 1: socketpair(0x1, 0x5, 0x38010000, &(0x7f0000000640)) 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x15010000, &(0x7f0000000640)) [ 2941.425928] FAULT_INJECTION: forcing a failure. [ 2941.425928] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.461530] CPU: 0 PID: 32230 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2941.469460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.478821] Call Trace: [ 2941.481424] dump_stack+0x1fc/0x2ef [ 2941.485068] should_fail.cold+0xa/0xf [ 2941.488879] ? setup_fault_attr+0x200/0x200 [ 2941.493292] ? should_fail+0x142/0x7b0 [ 2941.497216] __should_failslab+0x115/0x180 [ 2941.501482] should_failslab+0x5/0x10 [ 2941.505291] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2941.510403] __kmalloc_node+0x38/0x70 [ 2941.514238] blk_alloc_flush_queue+0x120/0x300 [ 2941.518833] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 15:13:48 executing program 1: socketpair(0x1, 0x5, 0x39000000, &(0x7f0000000640)) 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x16000000, &(0x7f0000000640)) 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x16010000, &(0x7f0000000640)) [ 2941.523648] blk_mq_init_allocated_queue+0x20c/0x1300 [ 2941.528870] ? blkcg_init_queue+0x1fd/0x540 [ 2941.533211] blk_mq_init_queue+0x5c/0xa0 [ 2941.537282] loop_add+0x2cb/0x8a0 [ 2941.540751] loop_control_ioctl+0x16c/0x480 [ 2941.545094] ? loop_lookup+0x1d0/0x1d0 [ 2941.548995] ? ksys_write+0x241/0x2a0 [ 2941.552820] ? loop_lookup+0x1d0/0x1d0 [ 2941.556717] do_vfs_ioctl+0xcdb/0x12e0 [ 2941.560614] ? lock_downgrade+0x720/0x720 [ 2941.564864] ? check_preemption_disabled+0x41/0x280 [ 2941.569912] ? ioctl_preallocate+0x200/0x200 15:13:48 executing program 1: socketpair(0x1, 0x5, 0x39010000, &(0x7f0000000640)) [ 2941.574334] ? __fget+0x356/0x510 [ 2941.577885] ? do_dup2+0x450/0x450 [ 2941.581431] ? vfs_write+0x393/0x540 [ 2941.585156] ? fput+0x2b/0x190 [ 2941.588362] ksys_ioctl+0x9b/0xc0 [ 2941.591824] __x64_sys_ioctl+0x6f/0xb0 [ 2941.595722] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2941.600321] do_syscall_64+0xf9/0x620 [ 2941.604135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2941.609444] RIP: 0033:0x465ef9 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x17000000, &(0x7f0000000640)) [ 2941.612674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2941.631948] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2941.640625] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2941.647909] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2941.656399] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2941.663678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2941.670956] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:48 executing program 2 (fault-call:1 fault-nth:37): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x0, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:48 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_GET_CONTEXT_ID(r1, 0x7b3, &(0x7f00000000c0)) 15:13:48 executing program 1: socketpair(0x1, 0x5, 0x3a000000, &(0x7f0000000640)) 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x17010000, &(0x7f0000000640)) [ 2941.842578] FAULT_INJECTION: forcing a failure. [ 2941.842578] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.868773] CPU: 1 PID: 32256 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2941.876696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.886072] Call Trace: [ 2941.888692] dump_stack+0x1fc/0x2ef [ 2941.892333] should_fail.cold+0xa/0xf [ 2941.896262] ? setup_fault_attr+0x200/0x200 [ 2941.900589] ? lock_acquire+0x170/0x3c0 [ 2941.904577] __should_failslab+0x115/0x180 [ 2941.908835] should_failslab+0x5/0x10 [ 2941.912640] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2941.917757] blk_mq_init_tags+0x6a/0x2b0 [ 2941.922170] blk_mq_alloc_rq_map+0x9d/0x230 [ 2941.926495] ? elevator_get+0x29/0x170 [ 2941.930390] blk_mq_init_sched+0x219/0x730 [ 2941.934641] elevator_init_mq+0xf0/0x180 [ 2941.938712] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2941.943914] blk_mq_init_queue+0x5c/0xa0 [ 2941.947987] loop_add+0x2cb/0x8a0 [ 2941.951445] loop_control_ioctl+0x16c/0x480 [ 2941.955805] ? loop_lookup+0x1d0/0x1d0 [ 2941.959734] ? ksys_write+0x241/0x2a0 [ 2941.963559] ? loop_lookup+0x1d0/0x1d0 [ 2941.967449] do_vfs_ioctl+0xcdb/0x12e0 [ 2941.971340] ? lock_downgrade+0x720/0x720 [ 2941.975503] ? check_preemption_disabled+0x41/0x280 [ 2941.980524] ? ioctl_preallocate+0x200/0x200 [ 2941.984939] ? __fget+0x356/0x510 [ 2941.988406] ? do_dup2+0x450/0x450 [ 2941.991947] ? vfs_write+0x393/0x540 [ 2941.995679] ? fput+0x2b/0x190 [ 2941.998896] ksys_ioctl+0x9b/0xc0 [ 2942.002353] __x64_sys_ioctl+0x6f/0xb0 [ 2942.006248] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2942.010842] do_syscall_64+0xf9/0x620 [ 2942.014668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2942.019861] RIP: 0033:0x465ef9 [ 2942.023054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:13:48 executing program 5: socketpair(0x1, 0x5, 0x18000000, &(0x7f0000000640)) 15:13:49 executing program 1: socketpair(0x1, 0x5, 0x3a010000, &(0x7f0000000640)) 15:13:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x0, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x0, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:49 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0xffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000080)={0x1f}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x2, 0xffffffffffffffff, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x3, 0x42f, &(0x7f0000000100)=0x1fffe0}) [ 2942.041966] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2942.049700] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2942.057087] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2942.064388] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2942.071663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2942.078953] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:49 executing program 2 (fault-call:1 fault-nth:38): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) [ 2942.301352] FAULT_INJECTION: forcing a failure. [ 2942.301352] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.326813] CPU: 1 PID: 32269 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2942.335097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2942.345915] Call Trace: [ 2942.348513] dump_stack+0x1fc/0x2ef [ 2942.352144] should_fail.cold+0xa/0xf [ 2942.356448] ? setup_fault_attr+0x200/0x200 [ 2942.361124] ? lock_acquire+0x170/0x3c0 [ 2942.365105] __should_failslab+0x115/0x180 [ 2942.369346] should_failslab+0x5/0x10 [ 2942.373325] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2942.378885] sbitmap_queue_init_node+0x240/0x6c0 [ 2942.383654] blk_mq_init_tags+0x16f/0x2b0 [ 2942.387933] blk_mq_alloc_rq_map+0x9d/0x230 [ 2942.392260] ? elevator_get+0x29/0x170 [ 2942.396168] blk_mq_init_sched+0x219/0x730 [ 2942.400471] elevator_init_mq+0xf0/0x180 [ 2942.404614] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2942.409816] blk_mq_init_queue+0x5c/0xa0 [ 2942.413876] loop_add+0x2cb/0x8a0 [ 2942.417341] loop_control_ioctl+0x16c/0x480 [ 2942.421846] ? loop_lookup+0x1d0/0x1d0 [ 2942.425759] ? ksys_write+0x241/0x2a0 [ 2942.429592] ? loop_lookup+0x1d0/0x1d0 [ 2942.433488] do_vfs_ioctl+0xcdb/0x12e0 [ 2942.437386] ? lock_downgrade+0x720/0x720 [ 2942.441567] ? check_preemption_disabled+0x41/0x280 [ 2942.446587] ? ioctl_preallocate+0x200/0x200 [ 2942.450986] ? __fget+0x356/0x510 [ 2942.454524] ? do_dup2+0x450/0x450 [ 2942.458056] ? vfs_write+0x393/0x540 [ 2942.461762] ? fput+0x2b/0x190 [ 2942.465061] ksys_ioctl+0x9b/0xc0 [ 2942.468638] __x64_sys_ioctl+0x6f/0xb0 [ 2942.476375] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2942.481166] do_syscall_64+0xf9/0x620 [ 2942.485003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2942.490223] RIP: 0033:0x465ef9 15:13:49 executing program 1: socketpair(0x1, 0x5, 0x3b000000, &(0x7f0000000640)) 15:13:49 executing program 5: socketpair(0x1, 0x5, 0x18010000, &(0x7f0000000640)) [ 2942.493420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2942.514909] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2942.522790] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2942.530159] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2942.537530] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2942.544806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:13:49 executing program 2 (fault-call:1 fault-nth:39): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:49 executing program 3: ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000080)={0x10000000ffffffff}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x262000, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2942.552092] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:49 executing program 1: socketpair(0x1, 0x5, 0x3b010000, &(0x7f0000000640)) 15:13:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x0, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:49 executing program 5: socketpair(0x1, 0x5, 0x19000000, &(0x7f0000000640)) 15:13:49 executing program 1: socketpair(0x1, 0x5, 0x3c000000, &(0x7f0000000640)) 15:13:49 executing program 5: socketpair(0x1, 0x5, 0x19010000, &(0x7f0000000640)) 15:13:49 executing program 1: socketpair(0x1, 0x5, 0x3c010000, &(0x7f0000000640)) 15:13:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x0, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2942.787292] FAULT_INJECTION: forcing a failure. [ 2942.787292] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.813322] CPU: 1 PID: 32288 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2942.821466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2942.831091] Call Trace: [ 2942.833710] dump_stack+0x1fc/0x2ef 15:13:49 executing program 1: socketpair(0x1, 0x5, 0x3d000000, &(0x7f0000000640)) [ 2942.837368] should_fail.cold+0xa/0xf [ 2942.841218] ? setup_fault_attr+0x200/0x200 [ 2942.845558] ? __lockdep_init_map+0x100/0x5a0 [ 2942.850091] __should_failslab+0x115/0x180 [ 2942.854347] should_failslab+0x5/0x10 [ 2942.858171] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2942.864100] __kmalloc_node+0x38/0x70 [ 2942.867933] blk_mq_alloc_rq_map+0xdf/0x230 [ 2942.872309] ? elevator_get+0x29/0x170 [ 2942.876227] blk_mq_init_sched+0x219/0x730 [ 2942.880807] elevator_init_mq+0xf0/0x180 15:13:49 executing program 5: socketpair(0x1, 0x5, 0x1a000000, &(0x7f0000000640)) [ 2942.884905] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2942.890146] blk_mq_init_queue+0x5c/0xa0 [ 2942.894354] loop_add+0x2cb/0x8a0 [ 2942.898782] loop_control_ioctl+0x16c/0x480 [ 2942.903118] ? loop_lookup+0x1d0/0x1d0 [ 2942.907035] ? ksys_write+0x241/0x2a0 [ 2942.910848] ? loop_lookup+0x1d0/0x1d0 [ 2942.914840] do_vfs_ioctl+0xcdb/0x12e0 [ 2942.918831] ? lock_downgrade+0x720/0x720 [ 2942.922992] ? check_preemption_disabled+0x41/0x280 [ 2942.928038] ? ioctl_preallocate+0x200/0x200 [ 2942.932458] ? __fget+0x356/0x510 [ 2942.936073] ? do_dup2+0x450/0x450 [ 2942.939620] ? vfs_write+0x393/0x540 [ 2942.943346] ? fput+0x2b/0x190 [ 2942.946737] ksys_ioctl+0x9b/0xc0 [ 2942.950210] __x64_sys_ioctl+0x6f/0xb0 [ 2942.954108] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2942.958794] do_syscall_64+0xf9/0x620 [ 2942.963759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2942.968956] RIP: 0033:0x465ef9 15:13:49 executing program 2 (fault-call:1 fault-nth:40): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:49 executing program 1: socketpair(0x1, 0x5, 0x3d010000, &(0x7f0000000640)) 15:13:49 executing program 5: socketpair(0x1, 0x5, 0x1a010000, &(0x7f0000000640)) 15:13:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2942.972160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2942.991821] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2942.999661] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2943.007645] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2943.014934] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2943.022302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2943.029562] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x0, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x0, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x3e000000, &(0x7f0000000640)) 15:13:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x3e010000, &(0x7f0000000640)) 15:13:50 executing program 5: socketpair(0x1, 0x5, 0x1b000000, &(0x7f0000000640)) 15:13:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2943.198850] FAULT_INJECTION: forcing a failure. [ 2943.198850] name failslab, interval 1, probability 0, space 0, times 0 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x3f000000, &(0x7f0000000640)) [ 2943.256586] CPU: 1 PID: 32319 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2943.264701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.274072] Call Trace: [ 2943.277287] dump_stack+0x1fc/0x2ef [ 2943.281901] should_fail.cold+0xa/0xf [ 2943.285721] ? setup_fault_attr+0x200/0x200 [ 2943.290058] ? __lockdep_init_map+0x100/0x5a0 [ 2943.294746] __should_failslab+0x115/0x180 [ 2943.299029] should_failslab+0x5/0x10 [ 2943.302981] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2943.309173] __kmalloc_node+0x38/0x70 [ 2943.312993] blk_mq_alloc_rq_map+0x120/0x230 [ 2943.317412] ? elevator_get+0x29/0x170 [ 2943.321316] blk_mq_init_sched+0x219/0x730 [ 2943.325937] elevator_init_mq+0xf0/0x180 [ 2943.330046] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2943.335350] blk_mq_init_queue+0x5c/0xa0 [ 2943.339455] loop_add+0x2cb/0x8a0 [ 2943.342942] loop_control_ioctl+0x16c/0x480 [ 2943.347269] ? loop_lookup+0x1d0/0x1d0 [ 2943.351177] ? ksys_write+0x241/0x2a0 [ 2943.354996] ? loop_lookup+0x1d0/0x1d0 [ 2943.358896] do_vfs_ioctl+0xcdb/0x12e0 [ 2943.362798] ? lock_downgrade+0x720/0x720 [ 2943.366964] ? check_preemption_disabled+0x41/0x280 [ 2943.372005] ? ioctl_preallocate+0x200/0x200 [ 2943.376443] ? __fget+0x356/0x510 [ 2943.379921] ? do_dup2+0x450/0x450 [ 2943.383500] ? vfs_write+0x393/0x540 [ 2943.387326] ? fput+0x2b/0x190 [ 2943.390641] ksys_ioctl+0x9b/0xc0 [ 2943.394115] __x64_sys_ioctl+0x6f/0xb0 [ 2943.398022] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2943.403400] do_syscall_64+0xf9/0x620 [ 2943.407237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2943.412437] RIP: 0033:0x465ef9 [ 2943.415633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2943.434528] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2943.442318] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2943.449586] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 15:13:50 executing program 2 (fault-call:1 fault-nth:41): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x3f010000, &(0x7f0000000640)) 15:13:50 executing program 5: socketpair(0x1, 0x5, 0x1b010000, &(0x7f0000000640)) 15:13:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x0, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2943.457018] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2943.464292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2943.471587] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x40000000, &(0x7f0000000640)) 15:13:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x0, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:50 executing program 5: socketpair(0x1, 0x5, 0x1c000000, &(0x7f0000000640)) 15:13:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x0, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x40010000, &(0x7f0000000640)) [ 2943.647458] FAULT_INJECTION: forcing a failure. [ 2943.647458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2943.718873] CPU: 0 PID: 32345 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2943.726988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.736356] Call Trace: [ 2943.738960] dump_stack+0x1fc/0x2ef [ 2943.742626] should_fail.cold+0xa/0xf [ 2943.746477] ? setup_fault_attr+0x200/0x200 [ 2943.750831] __alloc_pages_nodemask+0x239/0x2890 [ 2943.755612] ? kasan_kmalloc+0x139/0x160 [ 2943.759694] ? __kmalloc_node+0x4c/0x70 [ 2943.763684] ? blk_mq_alloc_rq_map+0x120/0x230 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x41000000, &(0x7f0000000640)) [ 2943.768382] ? blk_mq_init_sched+0x219/0x730 [ 2943.772899] ? elevator_init_mq+0xf0/0x180 [ 2943.777153] ? blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2943.782560] ? blk_mq_init_queue+0x5c/0xa0 [ 2943.786941] ? loop_add+0x2cb/0x8a0 [ 2943.790585] ? ksys_ioctl+0x9b/0xc0 [ 2943.794220] ? __x64_sys_ioctl+0x6f/0xb0 [ 2943.798288] ? do_syscall_64+0xf9/0x620 [ 2943.802279] ? should_fail+0x142/0x7b0 [ 2943.806396] ? fs_reclaim_release+0xd0/0x110 [ 2943.810818] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2943.815671] ? setup_fault_attr+0x200/0x200 [ 2943.820002] ? lock_acquire+0x170/0x3c0 [ 2943.823986] ? check_preemption_disabled+0x41/0x280 [ 2943.829540] ? should_fail+0x142/0x7b0 [ 2943.833964] ? setup_fault_attr+0x200/0x200 [ 2943.838294] ? __lockdep_init_map+0x100/0x5a0 [ 2943.842896] ? find_next_bit+0x105/0x130 [ 2943.847079] ? __cpu_to_node+0x7b/0xa0 [ 2943.850975] ? blk_mq_hw_queue_to_node+0xc1/0x100 [ 2943.856954] blk_mq_alloc_rqs+0x242/0x800 [ 2943.861152] ? blk_mq_alloc_rq_map+0xaa/0x230 [ 2943.865667] blk_mq_init_sched+0x26c/0x730 [ 2943.869993] elevator_init_mq+0xf0/0x180 [ 2943.874064] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2943.879281] blk_mq_init_queue+0x5c/0xa0 [ 2943.883369] loop_add+0x2cb/0x8a0 [ 2943.886814] loop_control_ioctl+0x16c/0x480 [ 2943.891145] ? loop_lookup+0x1d0/0x1d0 [ 2943.895048] ? ksys_write+0x241/0x2a0 [ 2943.898857] ? loop_lookup+0x1d0/0x1d0 [ 2943.902759] do_vfs_ioctl+0xcdb/0x12e0 [ 2943.906642] ? lock_downgrade+0x720/0x720 [ 2943.910787] ? check_preemption_disabled+0x41/0x280 [ 2943.915891] ? ioctl_preallocate+0x200/0x200 [ 2943.920401] ? __fget+0x356/0x510 [ 2943.923847] ? do_dup2+0x450/0x450 [ 2943.927390] ? vfs_write+0x393/0x540 [ 2943.931202] ? fput+0x2b/0x190 [ 2943.934545] ksys_ioctl+0x9b/0xc0 [ 2943.938287] __x64_sys_ioctl+0x6f/0xb0 [ 2943.942459] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2943.947142] do_syscall_64+0xf9/0x620 [ 2943.950965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2943.956768] RIP: 0033:0x465ef9 [ 2943.959965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2943.979336] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2943.987054] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2943.994548] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2944.002094] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2944.009372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:13:50 executing program 2 (fault-call:1 fault-nth:42): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:50 executing program 1: socketpair(0x1, 0x5, 0x41010000, &(0x7f0000000640)) 15:13:50 executing program 5: socketpair(0x1, 0x5, 0x1c010000, &(0x7f0000000640)) [ 2944.016732] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x0, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:51 executing program 1: socketpair(0x1, 0x5, 0x42000000, &(0x7f0000000640)) 15:13:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x0, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:51 executing program 5: socketpair(0x1, 0x5, 0x1d000000, &(0x7f0000000640)) [ 2944.237243] FAULT_INJECTION: forcing a failure. [ 2944.237243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2944.279158] CPU: 1 PID: 32372 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2944.287184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.296633] Call Trace: [ 2944.299241] dump_stack+0x1fc/0x2ef [ 2944.303063] should_fail.cold+0xa/0xf [ 2944.306876] ? setup_fault_attr+0x200/0x200 [ 2944.311233] __alloc_pages_nodemask+0x239/0x2890 [ 2944.316005] ? kasan_kmalloc+0x139/0x160 [ 2944.320103] ? __kmalloc_node+0x4c/0x70 [ 2944.324086] ? blk_mq_alloc_rq_map+0x120/0x230 [ 2944.328664] ? blk_mq_init_sched+0x219/0x730 [ 2944.333166] ? elevator_init_mq+0xf0/0x180 [ 2944.337389] ? blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2944.343260] ? blk_mq_init_queue+0x5c/0xa0 [ 2944.347499] ? loop_add+0x2cb/0x8a0 [ 2944.351138] ? ksys_ioctl+0x9b/0xc0 [ 2944.354865] ? should_fail+0x142/0x7b0 [ 2944.360863] ? fs_reclaim_release+0xd0/0x110 [ 2944.365329] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2944.370205] ? setup_fault_attr+0x200/0x200 [ 2944.374558] ? lock_acquire+0x170/0x3c0 [ 2944.378565] ? check_preemption_disabled+0x41/0x280 [ 2944.383600] ? should_fail+0x142/0x7b0 [ 2944.387493] ? setup_fault_attr+0x200/0x200 [ 2944.391833] ? __lockdep_init_map+0x100/0x5a0 [ 2944.396344] ? find_next_bit+0x105/0x130 [ 2944.400405] ? __cpu_to_node+0x7b/0xa0 [ 2944.404299] blk_mq_alloc_rqs+0x242/0x800 [ 2944.408463] blk_mq_init_sched+0x26c/0x730 [ 2944.413186] elevator_init_mq+0xf0/0x180 [ 2944.417258] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2944.422640] blk_mq_init_queue+0x5c/0xa0 [ 2944.426721] loop_add+0x2cb/0x8a0 [ 2944.430183] loop_control_ioctl+0x16c/0x480 [ 2944.434585] ? loop_lookup+0x1d0/0x1d0 [ 2944.438483] ? ksys_write+0x241/0x2a0 [ 2944.442281] ? loop_lookup+0x1d0/0x1d0 [ 2944.446179] do_vfs_ioctl+0xcdb/0x12e0 [ 2944.450081] ? lock_downgrade+0x720/0x720 [ 2944.454236] ? check_preemption_disabled+0x41/0x280 [ 2944.459256] ? ioctl_preallocate+0x200/0x200 [ 2944.463916] ? __fget+0x356/0x510 [ 2944.467468] ? do_dup2+0x450/0x450 [ 2944.471029] ? vfs_write+0x393/0x540 [ 2944.474756] ? fput+0x2b/0x190 [ 2944.478086] ksys_ioctl+0x9b/0xc0 [ 2944.482563] __x64_sys_ioctl+0x6f/0xb0 [ 2944.486573] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2944.491830] do_syscall_64+0xf9/0x620 [ 2944.495636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.500835] RIP: 0033:0x465ef9 [ 2944.504052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:13:51 executing program 5: socketpair(0x1, 0x5, 0x1d010000, &(0x7f0000000640)) 15:13:51 executing program 1: socketpair(0x1, 0x5, 0x42010000, &(0x7f0000000640)) 15:13:51 executing program 5: socketpair(0x1, 0x5, 0x1e000000, &(0x7f0000000640)) [ 2944.524002] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2944.531727] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2944.539029] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2944.547134] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2944.554408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2944.561682] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:51 executing program 2 (fault-call:1 fault-nth:43): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0x0, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:51 executing program 1: socketpair(0x1, 0x5, 0x43000000, &(0x7f0000000640)) 15:13:51 executing program 5: socketpair(0x1, 0x5, 0x1e010000, &(0x7f0000000640)) 15:13:51 executing program 1: socketpair(0x1, 0x5, 0x43010000, &(0x7f0000000640)) [ 2944.749864] FAULT_INJECTION: forcing a failure. [ 2944.749864] name failslab, interval 1, probability 0, space 0, times 0 [ 2944.790393] CPU: 0 PID: 32397 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 15:13:51 executing program 5: socketpair(0x1, 0x5, 0x1f000000, &(0x7f0000000640)) [ 2944.798403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.807763] Call Trace: [ 2944.810376] dump_stack+0x1fc/0x2ef [ 2944.814038] should_fail.cold+0xa/0xf [ 2944.817872] ? setup_fault_attr+0x200/0x200 [ 2944.822736] ? lock_acquire+0x170/0x3c0 [ 2944.827105] __should_failslab+0x115/0x180 [ 2944.831356] should_failslab+0x5/0x10 [ 2944.835169] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2944.840302] elevator_alloc+0x7a/0x200 [ 2944.844216] dd_init_queue+0x20/0x430 [ 2944.848169] blk_mq_init_sched+0x395/0x730 15:13:51 executing program 5: socketpair(0x1, 0x5, 0x1f010000, &(0x7f0000000640)) [ 2944.852439] elevator_init_mq+0xf0/0x180 [ 2944.856551] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2944.861799] blk_mq_init_queue+0x5c/0xa0 [ 2944.865923] loop_add+0x2cb/0x8a0 [ 2944.869396] loop_control_ioctl+0x16c/0x480 [ 2944.873731] ? loop_lookup+0x1d0/0x1d0 [ 2944.877639] ? ksys_write+0x241/0x2a0 [ 2944.881453] ? loop_lookup+0x1d0/0x1d0 [ 2944.885365] do_vfs_ioctl+0xcdb/0x12e0 [ 2944.889286] ? lock_downgrade+0x720/0x720 [ 2944.893445] ? check_preemption_disabled+0x41/0x280 [ 2944.898474] ? ioctl_preallocate+0x200/0x200 15:13:51 executing program 5: socketpair(0x1, 0x5, 0x20000000, &(0x7f0000000640)) [ 2944.902958] ? __fget+0x356/0x510 [ 2944.906524] ? do_dup2+0x450/0x450 [ 2944.910071] ? vfs_write+0x393/0x540 [ 2944.913834] ? fput+0x2b/0x190 [ 2944.917060] ksys_ioctl+0x9b/0xc0 [ 2944.920524] __x64_sys_ioctl+0x6f/0xb0 [ 2944.924426] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2944.929021] do_syscall_64+0xf9/0x620 [ 2944.932838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.938121] RIP: 0033:0x465ef9 15:13:51 executing program 1: socketpair(0x1, 0x5, 0x44000000, &(0x7f0000000640)) [ 2944.941343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2944.960277] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2944.968708] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2944.975997] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2944.983276] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2944.991325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:13:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2944.998591] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:52 executing program 2 (fault-call:1 fault-nth:44): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0x0, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0xe3, 0x2, 0x0, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 5: socketpair(0x1, 0x5, 0x20010000, &(0x7f0000000640)) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x44010000, &(0x7f0000000640)) 15:13:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x45000000, &(0x7f0000000640)) [ 2945.159955] FAULT_INJECTION: forcing a failure. [ 2945.159955] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.182715] CPU: 1 PID: 32424 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2945.190640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.200259] Call Trace: [ 2945.202862] dump_stack+0x1fc/0x2ef [ 2945.206510] should_fail.cold+0xa/0xf 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x45010000, &(0x7f0000000640)) [ 2945.210321] ? setup_fault_attr+0x200/0x200 [ 2945.214670] ? lock_acquire+0x170/0x3c0 [ 2945.218661] __should_failslab+0x115/0x180 [ 2945.222963] should_failslab+0x5/0x10 [ 2945.226777] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2945.232075] dd_init_queue+0x94/0x430 [ 2945.235892] blk_mq_init_sched+0x395/0x730 [ 2945.240151] elevator_init_mq+0xf0/0x180 [ 2945.244266] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 2945.249575] blk_mq_init_queue+0x5c/0xa0 [ 2945.253667] loop_add+0x2cb/0x8a0 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x46000000, &(0x7f0000000640)) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x46010000, &(0x7f0000000640)) [ 2945.257139] loop_control_ioctl+0x16c/0x480 [ 2945.261473] ? loop_lookup+0x1d0/0x1d0 [ 2945.265378] ? finish_task_switch+0x118/0x760 [ 2945.270336] ? _raw_spin_unlock_irq+0x24/0x80 [ 2945.274857] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2945.279455] ? loop_lookup+0x1d0/0x1d0 [ 2945.283355] do_vfs_ioctl+0xcdb/0x12e0 [ 2945.287280] ? lock_downgrade+0x720/0x720 [ 2945.291531] ? check_preemption_disabled+0x41/0x280 [ 2945.296574] ? ioctl_preallocate+0x200/0x200 [ 2945.301042] ? __fget+0x356/0x510 [ 2945.304517] ? do_dup2+0x450/0x450 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x47000000, &(0x7f0000000640)) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x47010000, &(0x7f0000000640)) [ 2945.308140] ksys_ioctl+0x9b/0xc0 [ 2945.311627] __x64_sys_ioctl+0x6f/0xb0 [ 2945.315550] do_syscall_64+0xf9/0x620 [ 2945.319396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2945.324619] RIP: 0033:0x465ef9 [ 2945.327836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2945.347236] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:52 executing program 2 (fault-call:1 fault-nth:45): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 5: socketpair(0x1, 0x5, 0x21000000, &(0x7f0000000640)) 15:13:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0x0, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x48000000, &(0x7f0000000640)) 15:13:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x0, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2945.355696] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2945.363072] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2945.370357] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2945.377638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2945.384923] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x48010000, &(0x7f0000000640)) 15:13:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x0, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2945.501063] FAULT_INJECTION: forcing a failure. [ 2945.501063] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.529095] CPU: 1 PID: 32450 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2945.537153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.546519] Call Trace: 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x49000000, &(0x7f0000000640)) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x49010000, &(0x7f0000000640)) [ 2945.549125] dump_stack+0x1fc/0x2ef [ 2945.552778] should_fail.cold+0xa/0xf [ 2945.556600] ? setup_fault_attr+0x200/0x200 [ 2945.560941] ? lock_acquire+0x170/0x3c0 [ 2945.564995] __should_failslab+0x115/0x180 [ 2945.569258] should_failslab+0x5/0x10 [ 2945.573077] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2945.578200] elevator_alloc+0x7a/0x200 [ 2945.582125] dd_init_queue+0x20/0x430 [ 2945.586993] blk_mq_init_sched+0x395/0x730 [ 2945.591424] elevator_init_mq+0xf0/0x180 [ 2945.595515] blk_mq_init_allocated_queue+0xe1f/0x1300 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x4a000000, &(0x7f0000000640)) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x4a010000, &(0x7f0000000640)) [ 2945.600746] blk_mq_init_queue+0x5c/0xa0 [ 2945.604821] loop_add+0x2cb/0x8a0 [ 2945.608292] loop_control_ioctl+0x16c/0x480 [ 2945.612651] ? loop_lookup+0x1d0/0x1d0 [ 2945.616560] ? ksys_write+0x241/0x2a0 [ 2945.620381] ? loop_lookup+0x1d0/0x1d0 [ 2945.624283] do_vfs_ioctl+0xcdb/0x12e0 [ 2945.628188] ? lock_downgrade+0x720/0x720 [ 2945.632627] ? check_preemption_disabled+0x41/0x280 [ 2945.637749] ? ioctl_preallocate+0x200/0x200 [ 2945.642181] ? __fget+0x356/0x510 [ 2945.645651] ? do_dup2+0x450/0x450 [ 2945.649202] ? vfs_write+0x393/0x540 [ 2945.652951] ? fput+0x2b/0x190 [ 2945.656165] ksys_ioctl+0x9b/0xc0 [ 2945.659636] __x64_sys_ioctl+0x6f/0xb0 [ 2945.663561] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2945.668178] do_syscall_64+0xf9/0x620 [ 2945.671997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2945.677204] RIP: 0033:0x465ef9 [ 2945.680415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2945.700403] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2945.708223] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2945.715847] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2945.723142] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2945.730434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2945.742401] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:52 executing program 2 (fault-call:1 fault-nth:46): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x4b000000, &(0x7f0000000640)) 15:13:52 executing program 5: socketpair(0x1, 0x5, 0x21010000, &(0x7f0000000640)) 15:13:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0x0, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x0, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0x0, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x4b010000, &(0x7f0000000640)) 15:13:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x4c000000, &(0x7f0000000640)) [ 2945.879301] FAULT_INJECTION: forcing a failure. [ 2945.879301] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.893900] CPU: 1 PID: 32475 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2945.901824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.911386] Call Trace: [ 2945.913997] dump_stack+0x1fc/0x2ef [ 2945.917726] should_fail.cold+0xa/0xf [ 2945.921548] ? setup_fault_attr+0x200/0x200 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x4c010000, &(0x7f0000000640)) [ 2945.925893] ? lock_acquire+0x170/0x3c0 [ 2945.929897] __should_failslab+0x115/0x180 [ 2945.934175] should_failslab+0x5/0x10 [ 2945.940020] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2945.945149] __kmalloc_node+0x38/0x70 [ 2945.948967] disk_expand_part_tbl+0x1b4/0x3a0 [ 2945.953480] __alloc_disk_node+0x118/0x410 [ 2945.957785] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2945.962383] loop_add+0x39c/0x8a0 [ 2945.965876] loop_control_ioctl+0x16c/0x480 [ 2945.970205] ? loop_lookup+0x1d0/0x1d0 [ 2945.974133] ? ksys_write+0x241/0x2a0 15:13:52 executing program 1: socketpair(0x1, 0x5, 0x4d000000, &(0x7f0000000640)) [ 2945.978057] ? loop_lookup+0x1d0/0x1d0 [ 2945.981959] do_vfs_ioctl+0xcdb/0x12e0 [ 2945.985867] ? lock_downgrade+0x720/0x720 [ 2945.990051] ? check_preemption_disabled+0x41/0x280 [ 2945.995110] ? ioctl_preallocate+0x200/0x200 [ 2945.999543] ? __fget+0x356/0x510 [ 2946.003269] ? do_dup2+0x450/0x450 [ 2946.006820] ? vfs_write+0x393/0x540 [ 2946.010550] ? fput+0x2b/0x190 [ 2946.013779] ksys_ioctl+0x9b/0xc0 [ 2946.017253] __x64_sys_ioctl+0x6f/0xb0 [ 2946.021161] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2946.025775] do_syscall_64+0xf9/0x620 [ 2946.029598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.034797] RIP: 0033:0x465ef9 [ 2946.038020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2946.056938] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2946.064833] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2946.072121] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 15:13:53 executing program 2 (fault-call:1 fault-nth:47): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x4d010000, &(0x7f0000000640)) 15:13:53 executing program 5: socketpair(0x1, 0x5, 0x22000000, &(0x7f0000000640)) 15:13:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0x0, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2946.079382] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.086641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2946.094083] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0x0, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:53 executing program 3: socketpair(0x1, 0x5, 0x1d010000, &(0x7f0000000640)) 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x4e000000, &(0x7f0000000640)) 15:13:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x4e010000, &(0x7f0000000640)) [ 2946.216931] FAULT_INJECTION: forcing a failure. [ 2946.216931] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.233266] CPU: 1 PID: 32497 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2946.241187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.250664] Call Trace: [ 2946.253296] dump_stack+0x1fc/0x2ef [ 2946.256943] should_fail.cold+0xa/0xf [ 2946.260760] ? setup_fault_attr+0x200/0x200 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x4f000000, &(0x7f0000000640)) [ 2946.265097] ? lock_acquire+0x170/0x3c0 [ 2946.269094] __should_failslab+0x115/0x180 [ 2946.273346] should_failslab+0x5/0x10 [ 2946.277270] kmem_cache_alloc_trace+0x284/0x380 [ 2946.282061] rand_initialize_disk+0x3b/0xc0 [ 2946.286398] __alloc_disk_node+0x234/0x410 [ 2946.291083] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2946.295680] loop_add+0x39c/0x8a0 [ 2946.299761] loop_control_ioctl+0x16c/0x480 [ 2946.304102] ? loop_lookup+0x1d0/0x1d0 [ 2946.308286] ? ksys_write+0x241/0x2a0 [ 2946.312118] ? loop_lookup+0x1d0/0x1d0 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x4f010000, &(0x7f0000000640)) 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x50000000, &(0x7f0000000640)) [ 2946.316023] do_vfs_ioctl+0xcdb/0x12e0 [ 2946.319954] ? lock_downgrade+0x720/0x720 [ 2946.324143] ? check_preemption_disabled+0x41/0x280 [ 2946.329179] ? ioctl_preallocate+0x200/0x200 [ 2946.333605] ? __fget+0x356/0x510 [ 2946.337076] ? do_dup2+0x450/0x450 [ 2946.340942] ? vfs_write+0x393/0x540 [ 2946.344687] ? fput+0x2b/0x190 [ 2946.348160] ksys_ioctl+0x9b/0xc0 [ 2946.351629] __x64_sys_ioctl+0x6f/0xb0 [ 2946.355538] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2946.360140] do_syscall_64+0xf9/0x620 [ 2946.363978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.369531] RIP: 0033:0x465ef9 [ 2946.372736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2946.391670] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2946.399487] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2946.406891] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 15:13:53 executing program 2 (fault-call:1 fault-nth:48): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x50010000, &(0x7f0000000640)) 15:13:53 executing program 5: socketpair(0x1, 0x5, 0x22010000, &(0x7f0000000640)) [ 2946.414645] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.422046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2946.429327] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 15:13:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0x0, 0x9a, 0x3, 0xe3, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0x0, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x0, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x0, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x0, 0xe3, 0x2, 0x26723704, 0x42e7, 0x0, 0x0, 0x7381, 0x995, 0x0, 0x0, 0x7ff8000000, 0x9, 0x1f, 0x0, 0x8000, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x87, '\x00', 0xfffffffe}, 0x0, [0x401, 0x7, 0x0, 0x4, 0x0, 0x401, 0x80000000, 0x3, 0x100000001, 0x1f6, 0x4, 0xffff, 0xfffffffffffffff7, 0x7, 0xef, 0x7, 0xff, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x2000000000001, 0x3, 0x5, 0x4, 0xabc, 0x7, 0x20, 0x5, 0x4, 0x3, 0xff, 0x200, 0x8, 0x1, 0xca, 0x7fffffff, 0x92, 0x0, 0x6, 0x0, 0x6, 0x100000001, 0x1, 0x4bd4, 0x3ff, 0x8000, 0x8, 0x2, 0x9, 0x5, 0x30c8822b, 0x20, 0x400000000000000, 0x18d2, 0x80, 0x1, 0xfff, 0x3, 0x10000, 0x1000, 0x2, 0x4000007, 0xcf, 0xffffffffffff8000, 0x0, 0xb7fd, 0x8, 0x7, 0x8001, 0x10000, 0x0, 0x2d, 0x1000, 0x3, 0x0, 0x6, 0x28, 0x1f, 0x0, 0x7, 0x5851, 0x4, 0x0, 0x1, 0x4, 0x4, 0x5, 0x7, 0x8001, 0x9, 0x400, 0xfffffffffffffffa, 0xb0db, 0x1, 0xffffffff, 0x9a, 0x3, 0x0, 0x2, 0x26723704, 0x42e7, 0xcbd, 0x0, 0x7381, 0x995, 0x0, 0x9, 0x7ff8000000, 0x9, 0x1f, 0x2, 0x0, 0x0, 0x7fa, 0x4d, 0x8000, 0x7, 0x3e, 0xffff, 0xfffffffffffeffff, 0x0, 0x1080000000000000, 0xfffffffffffffffb, 0x6c0, 0x6, 0x0, 0x5e, 0xc070, 0xd47]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x51000000, &(0x7f0000000640)) 15:13:53 executing program 5: socketpair(0x1, 0x5, 0x23000000, &(0x7f0000000640)) [ 2946.597141] FAULT_INJECTION: forcing a failure. [ 2946.597141] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.621730] CPU: 0 PID: 32528 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2946.629881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.642116] Call Trace: [ 2946.644722] dump_stack+0x1fc/0x2ef [ 2946.648410] should_fail.cold+0xa/0xf [ 2946.652245] ? setup_fault_attr+0x200/0x200 [ 2946.656584] ? lock_acquire+0x170/0x3c0 [ 2946.660576] __should_failslab+0x115/0x180 [ 2946.664824] should_failslab+0x5/0x10 [ 2946.668634] kmem_cache_alloc_trace+0x284/0x380 [ 2946.673358] device_create_groups_vargs+0x8a/0x270 [ 2946.678342] device_create_vargs+0x3a/0x50 [ 2946.682683] bdi_register_va.part.0+0x35/0x730 [ 2946.687282] bdi_register+0x12a/0x140 [ 2946.691110] ? bdi_register_va+0x80/0x80 [ 2946.695190] ? vsnprintf+0x2cc/0x14f0 [ 2946.699006] bdi_register_owner+0x59/0x100 [ 2946.703265] __device_add_disk+0xce5/0x1080 [ 2946.707792] ? sprintf+0xc0/0x100 [ 2946.711444] ? blk_alloc_devt+0x2d0/0x2d0 [ 2946.715620] ? __init_waitqueue_head+0x31/0x90 [ 2946.720240] ? __lockdep_init_map+0x100/0x5a0 [ 2946.724936] loop_add+0x626/0x8a0 [ 2946.728412] loop_control_ioctl+0x16c/0x480 [ 2946.732750] ? loop_lookup+0x1d0/0x1d0 [ 2946.736782] ? ksys_write+0x241/0x2a0 [ 2946.742497] ? loop_lookup+0x1d0/0x1d0 [ 2946.746395] do_vfs_ioctl+0xcdb/0x12e0 [ 2946.750381] ? lock_downgrade+0x720/0x720 [ 2946.754636] ? check_preemption_disabled+0x41/0x280 [ 2946.759680] ? ioctl_preallocate+0x200/0x200 [ 2946.764205] ? __fget+0x356/0x510 [ 2946.767670] ? do_dup2+0x450/0x450 [ 2946.771351] ? vfs_write+0x393/0x540 [ 2946.775141] ? fput+0x2b/0x190 [ 2946.778538] ksys_ioctl+0x9b/0xc0 [ 2946.782006] __x64_sys_ioctl+0x6f/0xb0 [ 2946.785916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2946.790514] do_syscall_64+0xf9/0x620 15:13:53 executing program 5: socketpair(0x1, 0x5, 0x23010000, &(0x7f0000000640)) 15:13:53 executing program 1: socketpair(0x1, 0x5, 0x51010000, &(0x7f0000000640)) [ 2946.794328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.799528] RIP: 0033:0x465ef9 [ 2946.802740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2946.821849] RSP: 002b:00007f5a46408188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2946.829802] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2946.837190] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2946.844488] RBP: 00007f5a464081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.851769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2946.859051] R13: 00007ffd1db5c06f R14: 00007f5a46408300 R15: 0000000000022000 [ 2946.882461] ------------[ cut here ]------------