000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = fcntl$getown(r0, 0x9) rt_tgsigqueueinfo(r1, r2, 0x1b, &(0x7f0000000000)={0x1e, 0xffffffffffffffc0, 0x2}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:20 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ffffff"}, 0x1c) 13:14:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:21 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:21 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x40) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000001c0)={r1, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="00fb4602faa684b1f9570ff2081d3c1d74fdfa40f56b34afb642eb4538ee63114186d8181ac3efead163c201be6e3a992af08cf560f784dc85ba17cd16aec40ed80000000000"], 0x46, 0x3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}}, 0x7c, 0x1, 0x1ff, 0x8000, 0x8}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="3f0002000400ee48f7ff7f000005d4"], 0xc) sendto(r0, &(0x7f0000000080)="01641308b99b31db2b7cae504831e42ac3ffb3430ea61f8a8150", 0x1a, 0x8000, &(0x7f0000000240)=@in6={0xa, 0x4e23, 0xf1f5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, 0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000580)=0x1, 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x42, &(0x7f0000000040)={r4, r5/1000+30000}, 0x10) sendto(r0, &(0x7f0000001480)="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", 0x1000, 0x1, &(0x7f0000000500)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ce\x00'}, 0x80) preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) r6 = gettid() getpriority(0x1, r6) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f00000005c0)=0x101) write$selinux_attr(r0, &(0x7f0000000200)='system_u:object_r:scanner_device_t:s0\x00', 0xfffffff2) 13:14:21 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:21 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:21 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ffff80"}, 0x1c) 13:14:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:22 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x40) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000001c0)={r1, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="00fb4602faa684b1f9570ff2081d3c1d74fdfa40f56b34afb642eb4538ee63114186d8181ac3efead163c201be6e3a992af08cf560f784dc85ba17cd16aec40ed80000000000"], 0x46, 0x3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}}, 0x7c, 0x1, 0x1ff, 0x8000, 0x8}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="3f0002000400ee48f7ff7f000005d4"], 0xc) sendto(r0, &(0x7f0000000080)="01641308b99b31db2b7cae504831e42ac3ffb3430ea61f8a8150", 0x1a, 0x8000, &(0x7f0000000240)=@in6={0xa, 0x4e23, 0xf1f5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, 0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000580)=0x1, 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x42, &(0x7f0000000040)={r4, r5/1000+30000}, 0x10) sendto(r0, &(0x7f0000001480)="b7e78a3a2b1112715aa0b25828910f1a2a942b3ff0b0a2edacd08d5b40381309b017badab98c3e5834bebd099755f86df7aadeff292d87d8c446cecc968ed4f54a135a1bf073c839bef121f5aad400edbd82f37006842aa218791e7e3252196f4d509cd6b1fdcb1461c162af697f122a3f9ba464c7f95afe3a671e397b1bb628c09293a97f827d1854d830fb30d3f9e8f57fc2ea194577ed6076d77ca85ddd6bfe3e5b36a65f631a894f02783ff66b422f56c2e770bff6725037fc5f58eb708f5c4a1755a21b69c42c953b99d7be37c7a66fbb84267c9928791fb5cc39ea790e156c4a7fc3e2c53cc5b652285ec43650f3d1503c4d7c41fb38e57b35d0504480711010cca8f07fc0e3c0286014b15ec5a31bfa93f3c643ee9dd74e03a159763add2a486f4e96d02d6ffc1361ee5311d8d30d9f34b042389733409fb4007870ded9bcfa7215e27eb49ffc9ab5b9bbccc56dcc5fc2416421dc5a4cdd00b772ca99b08a8e7234610659ba803374c8ccbfaa0378cf26a56b6afb7fbd00c1140e2398c4761ba27f7c04d746add87335fc39505fbfe7fcae31f23d8b0e1519c8bde7c70f4536bd5e3446074f183dfe975e09c51cdaf3f8e7cd1ac89fa076b7698f287f43420905ed4479eade32659c35514d52c80bbab00c4b9a32336c0cf19f69396e187baa1f48d5637c049aaae7b1e078ce683dec374d6aaf427e9683d6d9581b4643fbee8c59c0adb5f932a671a004fffbe35c5649ba0b02c047bbd84223039b2f28651db8012e606ede29cdaffa2536fbf4f5f75e1d12a5a8e7cc3add6da7b0fede69d11a6390de4f7cd223360c48caad1206957378695549e9b8fb5302645d83acf8078ad454d67c7c0da50591c68cf52edcca7e23d74eb22a48db73addcd66fc2bd5389b3e3c39eba3dc798160c7b1a42a27544d00755c91d157a6e0109f28464badbd770776bb12eac04bfeec9aaa54903b53d4188d65f806d967051b0cd5616b9b1a4f5b2e17b8a0250e0377cba671be8a7d1fe4743b352fc6be1b8eb790ee55cb43a338963ef0a63673dc499512eedda65c464c0c3c4f3dc1753448f4c770cc3749296b0843991800fc3cd459a4b9c05e35f4b5032feedf591ff5c11935c46fab2f96423cf2e568355af015acb429ee4ea44349a57d98d94f6079a74344b673f75bb41e24f6a5f3af599a1a4f7a4cf2ea61f96a48c1635f807f38650c83bbe23d23d64f7293809111810046129009fa68bfa5117427453cb10465f08006a1f774b1815f304bdaf3da9cac7bfb4a97c61f204cbec7af6de59f2c71187ea54d73c158a274ebbf4c5b8cb332acdce5f50c37c1c3c9153c5fd0bacbb31b9625b2fd775ea9e48e290dfb4e25f3d105bd0cee6df560f5fae61398ac464ee5a147ede368b264e031f8a612a70a1def23cd9cdcc58636c25c6eefe207d30faab6061732498c4f8aac812dc30dbaeb24d54695100bb5c5fb17824da07387953f5c5de8da60bd0a4c43b10305392c750aa645b6701aabe44ff56029a6374f4183ac9e4bd4904331a98175b74387ba8e712429c895476c225f124cd01e310cff1bcea3aa0bebb00df445a8548dc69a8f7864cab98146c8d4966b870f4e1543c13a0915266bd5f8c29b185209e207a0a6c9603f55f17d6682bba9cec8aea1a177177bd92134e7c5594aa3bf6c80290fe10db34fd5a6cb08df37c97a5adc10bce9887517b57574e5070130dd0d3a3113e82beae9037f95698c2edfa0cd8bb278f3b137f1e8e216f9339d3fd689e0022db7069745720537b5b2ea3cc3d9fdc9971aad076a093a8a4c9dad8d7f59a02e06bf9a550a9642961da4cce0a488073a12c5f7fa46a2202a5b00e412d02262ae76ff50d5de0c634780a18e7788d0d9c344ab2cab849b71c3cdd48a7ee616602a0388d6a68b7be230d68f4dd5d0a388b8bc037348a4e5ffee70d72aa2ab64e11a7dd148c078740841d07511142477bdadbc5ba8ae293a64a0dd0b118940ef34a915597dfe32f3651019327808a12b59427147ea0e26b34d4d3174a7a25fb267f83bcbb681c8cc1ba6d13fa21c070efd0f5164fd917f3202daa14841db5a0b7c5d1102fc188f121e2529f68b287619ce3e971468328ce0882116b8cc6aaaa498285ef4ef0bdfc8080263a7fb3c9dcc190c834625bbd4b9335dea2a9e99891f56b10c33f7930c66410c5e05a2e9dd50147bd12255c008081d91300222e5fe9fc62d2de3cba5072510259b510bca2668cea8ed5ca098b3b17515bc60d3871dab87d3d123cefa48616107fa8030f96ed82e3339ae4eecbdcdb57e70613bcef393b133a3e0d8c9ddc4f1b5a47beeace05be878afad3d96a952e4b55c2cb8c22739a0ea12b6f1ee64995510951d0071b2f71683fa99060c3a0793b841c2c3fdcff4b303c0f27c13c6cbfab96f9086f4727df374e7578a5a3bc4a7cba4d5754a7094d5879ec9c9b85af078cbaf37b3c8eaa820b02e4b1c113efae806f7c51edd3258116ee5508497887e6deeb3c2528b33595649af6660b83d14afcd6bae4baaa92de518ed90f975817b844c3d21e408f45520139a84b91f4871eb26136f368ff7078128640d0d4ed3879d772d5ed1d3a38a424f20df2bcd8de94c09592880d244167afc6ff3f3e60ac8f92ad896ada7511b651efe8e3b28f382fbad95a80db0430ef624f2c3f34972f053d3133d51d0470addc4099bdb2f7bfdef4cb6988ebecf52fa6f77f0731b930caa6566eaa441a300fcf5854f628679e65d12f51f9bf69823112a0cc14f91882c387a379f98949148bd6f17343b20f9c6aa7b808a33326963886156301802de44068840b5f9a9c22e4281e33777e2f2cf9155d6c0c104b82f4136199c394f14a40b01497fcdc0088b9a92b6cf6eab5ad5bb9f536b74a24dab51820555f8398448bb80fd0dca52b9963d368ddb2268a7845635847efd4e1460b24116969d382166a7052c9e97ac99b546284ccc3f8a2f5bb8b42fe9c98c784bb291341feafb8585fbafb144652e9e6d12fe3285afc8af4e26d345673026c6a7cc7152f611379f448f49a34891eb00578ad74748840b41809193d5362340701d27fbb7c540e2448c237a9db252b5279e0be7cc189936dd082266d64a61c1fd2ad4ce195439aae7eafe57a33608faceb6564ac84badfd5f4d9ab8db735e9c38428c515ff00e18e5fb7c5ee77f37138e41dc280e93c6c165b2f962a5098820d363085548e525dc8c47d03662d74283fbdea33bdf1fa87356a85c5cc41d6d9db4bb9f6b8532d32567558f2b2fea5fe710311048e99fb023fe2c14506672583af78f2ddbf057938d692050057d4847e7e63510d09c22a7dc23096daeca3b7bda04bb242b78c163b8088d3a6c8672750cd5ce8551f7a4c818103553575e0cff0e4c8385f08f3bfb2144338a54053970247bf6bb66f60c0569a97a6a92b8e9d888f2918feed454876792eef7cef2b709d6dab26c58dad382dedb90857ca32e94a6cb929a6bdbb00e93ffd622fafd73e1b2dd6249d35c447d3d3dd38893ffb0e65c09b4db591ebb9520fdb310adf63d53a597060685fd2b1f7a16d53832e7763df67688a1442881bf69ce0018604d494b2b21d0689d94ab6bafc2d96ad545fedddaa71cf8b00d1ea1209f9f2293ec6ca20ee6622aa6afc053dcec11c11fb5632cc95aa8a2767901a29e7804b45516502c1a593a110113784a864d0a7636c64e4d0007277b2a7cd571bc703e1ab72e97fb8465af4ddafad76cbe9dc42c8dd7fb24c2a837508ab7ffee5c50cbc65055185fb8a489ba03dbb194a2b59a791ec2f27784852e37d1fd933426c0508f87314096723e48b9dcbb03deb6b34ba327b8cc3372128d43a068b5df1864c74036c1084d3313ee90cce18b78bde216b978623daab86aa9d39cc96d8c1c71bd2d3bec81abf6a3848c2291a2c6e6b18f46f5d4198dc3c2cf01ce5b4e1d53f63a4fd5f54a2b559472707d5cb1b89c61f066feaaaf0b4855f6ae71e1de56538ab1211e0b5ee99c910d67b0fbbb0c006e2a480e073b08ea4162c37a96ade939d86870a88eec86bb0b26d0a11a4fc308417167595eae70ff8d618f59e63954c6de2d30e91e08d238deaa534a4a1548c864dc9adec49c35b04ff50ad30dde0cd4141cef5c7827e23503c8704a1a6823dc78752c2cc2ad534747c255ba6b6f3efdc3159ff6571ada6dc9a60ec404a56f67303e0f49c2ad1a9b2d6264229e2ecbe743edb8399a2dc91940a7df4b5530cdef5dc81eae33c01699b699ef2008ecacccf16c6abea1d26226af2600d998ced72586dc5fd615b51aae8833736077290a59d5b95e49bcddf058762f17ec91de2ce8f47bb6f2f489f0f6f82ede4c2d6b55b86294fb64729c61e8aa9fc9fac66f0b8427034520cef1aae3417c56767c90dc09c38ec84e3b5ae0aff057f8c0a5a617f00f109b581ebce2fd33bc6af932c9a9911869d1a4a2a9d9a2dfe5ff240541d9179038f276e7ebd38945c75a6058fb45d8578760774b769b1c227aabbaa351baf8f5d52c94bf94f13cdda64ef94bbcf69be12cda428ceec7bc8158c37922a5f58bf8494c6634941ae18544d07b997661efa54af52de1be21703a7b3d5f0a0aed59ab607b8034cef07140a122873b338d2eab141863b69388bb1360adbad19d8f62676a7b3db12966f754e6f80e6cdce5978606638116ac3758e732003e6455dfcda588d10705e05002e5c9df80a270f691a034b277fb41bd04d598fbcfc7a61937cf1c1d5da21d44cc828e3c8368427b7d41443f21a27ae85e77dd9ef82943778d990a84ac57b92ea37ef216441eb30a0e3a5ee680a24a02777fa429c7baeb561b817f587c53bdf23f997e67e0f26b9563d8c146fdd5d1786486bd88561b650bb3f2af8577b25450ec8ee5f542588c9b8351667dbb8136500c63be5759390ec5480d488638e10dee551e00b2b9a2776cc3a939226a6f06dce98be88f2a90e24ec6bc3029b9ba177e6175455e4b2d06eef1768accf3b82703f439c0eb4cff5f1005a3d740eb1119eac08d792b092a109b4287f750d2589b8730ad53ab0ca3dc4415d58550262e313764bb4b64ae5d304d23bb5db27b34cef9a0aab51534b170504459bed2e64801db63aec4b8f4ac74630a9439dabf300443e3f28357c5523f780259911a54e6cd196081fb3e1611339d5d36e744318a580194d286eeb8223babfe89e141eb0a93410aa64df057230093c8b08ce3cb08b5a69ccf63693e4ffdffcc771de215ef70c4c9d0ed3404f6e77ecf42caedb0d292f4514477b69ae8708c9a93ecce9c68643393b8dea78a12d2afdda1defd38d2caa0ce3b1d34c80b8b9f0d0c9ba00a46428022b0e648e815d6baa65e2ca76530553390ec10f001ace80fd4c6a32f7c98a963e19a78ca3709f5eaf1327e19ddd9e8c66c2940e25dbf1f9c938bd46d9566637d1c757ddf448305bbe950cab341e45fa171dfe8aa6eb94a99e88426edf73a25304a41dd4c40684e9f0b6862229989c0cceed44c7f9a923be6ca751f778be8970b98dafa81c4a237d70e18bd1230f11e1600a29229a27bf0f132d617ee4a21da5ae76ea217812918cd4c334c594d2cc7982693921dc7fd4c4862e4cdda85e84d82391b0bf6d180bb7b3110b64f9480d7cf4ca77fd55d487e7507d9c7674579f13663435abbc55df27eb6f98a7d60e67aeba337e2a6527578fe214cfa5b50f6c4fa4a3ca30e2723a0ff67de538985ebceb716d0394c545d119abd55e39469b99131b276d153589e386b513b445ea0b2e8a5c79ff1c1f335cf3df849c", 0x1000, 0x1, &(0x7f0000000500)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ce\x00'}, 0x80) preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) r6 = gettid() getpriority(0x1, r6) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f00000005c0)=0x101) write$selinux_attr(r0, &(0x7f0000000200)='system_u:object_r:scanner_device_t:s0\x00', 0xfffffff2) 13:14:22 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:22 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ffffc0"}, 0x1c) 13:14:22 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:22 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:22 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:22 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000001000"}, 0x1c) 13:14:22 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:22 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:23 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:23 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000fc00"}, 0x1c) 13:14:23 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:23 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:23 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:23 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:23 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 13:14:23 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:23 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 13:14:23 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:23 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:23 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:24 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:24 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000fc00"}, 0x1c) 13:14:24 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:24 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:24 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:24 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:24 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000ff00"}, 0x1c) 13:14:24 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:24 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:24 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:24 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:24 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000001000"}, 0x1c) 13:14:24 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:24 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) 13:14:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:24 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:25 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000100"}, 0x1c) 13:14:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:25 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 13:14:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:25 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 13:14:25 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:25 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:26 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 1: socket$kcm(0x2b, 0x0, 0x0) mlockall(0x3) 13:14:26 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffffffe000"}, 0x1c) 13:14:26 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:26 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000fc00"}, 0x1c) 13:14:26 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:26 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff80fe00"}, 0x1c) 13:14:26 executing program 1: socket$kcm(0x2b, 0x0, 0x0) mlockall(0x3) 13:14:26 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:26 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffffc0fe00"}, 0x1c) 13:14:26 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:27 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ff00"}, 0x1c) 13:14:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 1: socket$kcm(0x2b, 0x0, 0x0) mlockall(0x3) 13:14:27 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:27 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000ffff00"}, 0x1c) 13:14:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:27 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000fe80ffff00"}, 0x1c) 13:14:27 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 1: perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:27 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000fec0ffff00"}, 0x1c) 13:14:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:27 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:28 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[], 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:28 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000e0ffffff00"}, 0x1c) 13:14:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:28 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[], 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:28 executing program 1: perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:28 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) 13:14:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:28 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[], 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:28 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:28 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:28 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:28 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:29 executing program 1: perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:29 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:29 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:29 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff00"/436], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:29 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff00"/436], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:30 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:30 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/436], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) 13:14:30 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:30 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/654], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:30 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/654], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) 13:14:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/654], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/763], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) 13:14:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/763], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e8000000000000000000000000000000000000000000000000002000545241434500"/763], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 13:14:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000001000"}, 0x1c) 13:14:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/818], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:31 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) 13:14:32 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:32 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/818], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000fc00"}, 0x1c) 13:14:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:32 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/818], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 13:14:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:32 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:32 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) 13:14:32 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 13:14:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:32 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) 13:14:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) 13:14:32 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000fc00"}, 0x1c) 13:14:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 13:14:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) 13:14:32 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000ff00"}, 0x1c) 13:14:33 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) 13:14:33 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:33 executing program 5: perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:33 executing program 4: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) 13:14:33 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000001000"}, 0x1c) 13:14:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) 13:14:33 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 13:14:33 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:33 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 13:14:33 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='schedstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) 13:14:33 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:33 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 13:14:33 executing program 3: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000000c0)={0x2, 0x6, 0x1ff, 0x80000001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080), 0x4) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000100)=0x80, 0x4) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000040)={0x4, 0xffffffffdffffff7}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6e4, 0x40000) write$binfmt_aout(r1, &(0x7f0000000280)={{0x10f, 0x8, 0x1f499ee0, 0x323, 0x216, 0x3ff, 0x22c, 0x10}, "380e4287aa8305777f5305e8150e06ab341ce669731eb63dadf938872679945e35c1abbdcd44db7c0266c1f986dade161e297ce34676a887ffb1b774d631333cc0dc6e12b29154a4eac5785b10d46f147bc3f397684ce1fda7bba4c4eb323bde0faab651b35cc35a47c05eb5839a713b95dde3669a67879921007624ed92fbda03fd3361", [[]]}, 0x1a4) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 13:14:33 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:33 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000013c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r2}}]}) 13:14:33 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000ffffffe000"}, 0x1c) 13:14:34 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000fc00"}, 0x1c) 13:14:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) [ 284.643395][T19136] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000ffff80fe00"}, 0x1c) 13:14:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000ffffc0fe00"}, 0x1c) 13:14:34 executing program 3: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000000c0)={0x2, 0x6, 0x1ff, 0x80000001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080), 0x4) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000100)=0x80, 0x4) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000040)={0x4, 0xffffffffdffffff7}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6e4, 0x40000) write$binfmt_aout(r1, &(0x7f0000000280)={{0x10f, 0x8, 0x1f499ee0, 0x323, 0x216, 0x3ff, 0x22c, 0x10}, "380e4287aa8305777f5305e8150e06ab341ce669731eb63dadf938872679945e35c1abbdcd44db7c0266c1f986dade161e297ce34676a887ffb1b774d631333cc0dc6e12b29154a4eac5785b10d46f147bc3f397684ce1fda7bba4c4eb323bde0faab651b35cc35a47c05eb5839a713b95dde3669a67879921007624ed92fbda03fd3361", [[]]}, 0x1a4) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 13:14:34 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000013c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r2}}]}) 13:14:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f3"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ff00"}, 0x1c) 13:14:34 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305df"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ffff00"}, 0x1c) [ 285.559350][T19181] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:35 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305df"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:35 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000013c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0}, &(0x7f0000001900)=0xc) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r2}}]}) 13:14:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000fe80ffff00"}, 0x1c) 13:14:35 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) [ 285.846157][T19201] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:35 executing program 3: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0xfffffffffffffffe, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') r1 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x8, 0x3ff, 0x6, 0xa5f, 0x0, 0x3ff, 0x0, 0xb, 0x6, 0x2, 0xfffffffffffffffc, 0x7, 0x1, 0x84, 0xa33, 0x3, 0x9, 0x9, 0x5114b777, 0x8, 0x3f, 0x5, 0x1, 0x0, 0x443f, 0x2, 0x6, 0x52bb, 0x4, 0x6, 0x9, 0x100000001, 0x100, 0x1, 0x0, 0x7, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000080), 0xe}, 0x8004, 0x401, 0x69, 0x8, 0x7, 0x9, 0x3}, r1, 0xd, r0, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L-', 0x7}, 0x28, 0x1) 13:14:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000fec0ffff00"}, 0x1c) 13:14:35 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:35 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000013c0)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:35 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000e0ffffff00"}, 0x1c) 13:14:35 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) [ 286.427373][T19234] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:36 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:36 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:14:36 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, 0x0, 0x0) 13:14:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:36 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:36 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, 0x0, 0x0) 13:14:36 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) 13:14:36 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:36 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, 0x0, 0x0) [ 287.181364][T19267] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:36 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:36 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="00000000000000000000ffff00"}, 0x1c) 13:14:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:37 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 287.482961][T19294] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:37 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:14:37 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) 13:14:37 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:37 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:37 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) [ 287.949669][T19333] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:37 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) 13:14:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:37 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:37 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:14:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) [ 288.161845][T19356] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:37 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) 13:14:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:37 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) [ 288.377251][T19377] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:38 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:38 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000001000"}, 0x1c) 13:14:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:38 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:38 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="d830ad370c66e7b7eeadad0db7e78391f978c99aca007a765afec86d5fd552838a773fb87f0e3f0c5577c075620b5e53f7857ca10615f7e504cc9bf5e82e24f20baabd9ccbe25fd014c88974b7a939296b5fe3dba4256f3e115cf0e10c9cef18e33fa85ba17d965e666c8e2e9051f7ab18f66cbaf1f1075d47584134b3a936554b88cc99f95ad572e7b489636fa4594174979ff108395b03a4490f087ffe8219f39c36373c8cdd2db878a94fbdc817f1caa57d3a46bc657ca4eeb201d9eb4cf1e79f8fb6e424622dcfc143df4f2d9e9fec09412a85188cdcb81d4c2a7bbd385918cde90416ec40c5fef3244afd7c856e63677c08bde63aaeae407412af0287ccee0e73fa436db97949c7c69ac7ccc171c6b2681b3b5e01cdf4d44197603d4437dded6cbd7615064b88c496e2032b8bdb455ab9b46b49aa7b81abe3f0eb1aba2fd987a83ac25874f307a7fcbc335c17ee6003fde1b8b95f9d8d431d515ad990cd76f2deadd3a75043e69cc32a6486fc089be934256e82bc6c4ec9d57c6630ab7a1f1574105b5bbfe6f9ad82a0d063aa0158c0ad6202c6a4489013b46f5b110a55e758eb8b739afc48ad7daa2032124e085286bfa6807bd01f23a66602295bfd9686d0d2ffc2a0793634e354bef56b2067defc904f6c772c51884b7b902fb6fae15cf2964cd26256ab66ad60843c9195f28214fad4e55c8fab9341d710a1ade720ddb4cd7c9d0366a9d40d3d268ad41f760b14884ccf6882c0a73dccade1b9261793fa2b75c73fe559f8936cad08ada84e405821e8417b2cb6d5b1cb3d29a7421eb40d11d43a02b26c3a33468950a8169817017cb68bffb82ef21993ac6c3659f01e0d3b09489f714d4a3b51d539dd6a89453f8da9ae4e1eaa41af0922ffb609877fdaa2b433ad8e12e30f3f3888c583a2009cb77a265340c4b295a36acff556b6ab165d79446297b91019886c18943b76b4ca338fb0e3d90da59d5eb6bc222a3148fae1612316da368bb2d4f6532007168df28bc4f0cafec18f751708672cc06cf0aa9589aa42e9140511afea3488f86e78fbe39f852e65fbf476b6df82bfaa898fb94c3761c28a47233d9094d9b99fb2c65bee143802800b98860e1712d6c607159bcb6c7132955282eb1d1bda80581221d525b18d541b9e7645bde76a4107c11c295d38d582402aaaf9fcc8baaf15a6863115cfbb74b161adae45f68bd87504a78bfcc024457901f6b8b35b782ea81fa2872976674a6d65218bd3b1127e144777b2fd03beb499a76fd7920d4d8b914fe1398f0dfedd2910bdc7ff2a5342f45c2aa8d77ad39a46486cae52d7c7e7e3b6b9a9f71632a4ff24fd2e6be246a962b168937707370126bfaa68c7c33db92bc61b7d2050e3e0822800612f3a26ff9b272c0103e620afb0f76f1115e86b122d192c9e0d97504f8b7a27ba810afc3ededfc663865739827713789f96e9f2d1c8fd0f4e5fccb231e2aeed8a3fbaf0d7502582985ab1b5b238b4eeed450482323ea403a5ea38e49d831e9dfe7b4cd2d562b405b721f814e400824bd6cafa7800338ad517fe4395652dd46c81099e75a1d0f35b54adb3d3211e866fead4d0cbab4e81192fd8cc28a706203fc26695149e463b1acdfcf0b54da366f98e38db5fbbcc54a0989a3f7fea6b6e593a15bbb490a9465df20dca10b0496343045050d369db0c5ea65f637a8bc83861005bbf0e20d702c3f4b340b5a3f14a5f4f04a4c0b032a7f0f63c265555ab686fb48bc7794740aba1bd3153fd72f265373f99b700aaa19bc4e37c2a3a6174638d137ce5ddc1c8d9308a1751fae7099c93b0269a9e37b593a9faf3373a12901cb0d756520b1c0210f8f1af83e28d676d60c28093daf7edde180d5d4b7bb373c82906f5ad30439e2e4e982f957bceb2882f4ce9b0d5ca43dbafe956a6267adff4f802b64db92389c243214e5f0520ad5011fd16e3571454964e4968e5b5532db60d7e02e6a791b2641ce59b49febdf9880c5dde41166db16710407f8a45d1eb1aacb775a31c667de97efed170c1bf1516685502cf6bc9372f7873c2c83fc212f71189fbdb29496e82985a6683a8f38dbff0155bd4edb6407989ed6a1a8a230913d633001722d5f8a959edf9fadaeefd1b4001c1d8520b9721e430cb30312683b02d376aecfaf406cb449b5d4fc480a9e011e0eb43ccc177818228a049f6f90c07cbff926c4300e81d2621012a3860d13a85789a930b37e31e8e1841936465b567ce8ffda792751f19df1bf47dfb2cabe3d93fee60bf5e5dcbcc5c307fe40648d943b156e5efb3a90a3f364090299d8d58948eeba81e81219910a2ee0191e7ce9bdb50b706baa83ad72fa9fb1d98ee071ba353828419e536b50a071d80e782dc978687a9b0167821b71f3138936e455337f076b1eea450f053007d4167d6ee93829871f378713bbc9283252695ea5d4982e1e659c68778cb88b170268e2bae14cd8257ab707333f25b4786dd20672d8a02a10e0e5fd3ef2a9842f42c79e5465d565555bd7569fc52f414f2fadce17b8ac6b57d883e56d6016472a3fed7db8db80be06d9ff964a3c33b76366856ede8436c56cfa4531d75a8d81362475680e3c940ee104014db4ce284dbc06c3f0556cbeda76847fd513411e3fd5c452edf6f8f39f65624cc2287388d55e4ad2a67eea2dc8a694bf51ca4465305326d7ba2b9b93d30eae1f7c52092198bbf26d08ef8552e5d5be392fea78652e58df476d10bb630229900b3c8b714854e3a9c994e990b0be370387f7b5954d1a176d85e0e4d3a4b39a7c36a122e1233754edc4787833fa57fae554b8dc5d10bdceb0bdce918145600e4cd005739dce76d4db9254c2437202a6098c2dd249b029bc71023f1534736b917b22bc550d8a9971365ee39fb5cc5ac5824283fa02bca67d7bb399ef3729c50b059b188c45899bfd827a7cb694ca9213c418dafa41d4d28e150f279f7fb199f56e7c629151f02c60d5d22457dff0942b0e9931f726dc6b4a7f09d668807f825115542f25800557e5bac0aaf8850a119e199f08d9909bbb5f62ea42473f56edb1dd68ef505c26d75065ca5dc74f33fb6cb7ded2ea93e2032cd528a36446024be5b0376081ec1666dd90bf0a27cee907010f9c0122583e1e17eba819f96734ebd3a55283325649307e20701fb9ba6ceda2550e1eb33c822d663506d2e551e1af636b50ff4c79c01b5d709a3caf033b8a98368e6e68eefe7ee8bcda1a828bcbea8d411ae3bfedcbb34d35b7e68448a38ac6b06577bb6a4d826d87b3bdccc7df437a0d19663fc32afef8e6ca697e7765482aa76e029534c0a09e5675255df37cf00cdacb4c0a10065d30601b81f04fa9d28aeb6bab653ae61f7f3864368a3d4545eff25538f716682b9af83d118f04fbc76ad4fab18f3bc72f97d3388976894310eb8dafe9450d57ff11e4c1c8c68df4b3d7f70f3049eded6d0bc5ddc89a5b5e24ff6df5939112d1ae19e0c58e10132078c065854aa1901bec3b308ea5f32b5e5e694dc1b474ab3d9c58fa9216f4273fdb8083072cc7a7969c5755da9bbb5d9d6b8bb1d16027e4d53e2fd34df6684847c76dac8b3b67b19818eaa4ddaaf81215551aa37319efa133d218b241c3bb4349f2ee0548c078fd07d320d3169cca390c4e070d518858de91927022002be1c72fca28dec5e5b35080e9afb6a55beac3e76384fabce1a063aba57c30bb3778cff612f988f89d95ca49b2de329f30c673ab4b5dbd97c0b8efc45755ce1bf3ec46981ad832765f3bb3bce5974e922c58a8ca06cd05fd770708c7b4b2024fef2e411b66d4f458aa3b29efd614110c61388827ea12446990923a1a5e32ddfa35a88aff792398affcba6d7e2c2d23b72e0e8f95719e1484aadaa6e80196fbdb873b0d3cec6808569b5510568cff333cd9464b04f1a8f9626788fe7ee70221a3a1daef48fa136a84cbf419f7f2035876a23c7a843d77950d0d178e1875b999af0579e1191664b6a495621dcf4bcdb0dc4b3ae02f1da840987b26c22d75f390e2d0472716ae93051c14b4db0c07c77704e58dd366833579ce026f837bde6a49f3546f265e8faa136915c09ed29462565b4dc334ba7364046ca88b518d86f88629238969fe71fbb325532af67231ef097be8cbbb9a1217e198b62266a2b5dc61a810a3bde0f4ae3b0882bbd7a9661b2737add29b312831a04062ca318710463fa30ca0e25aa2d57dffcedb78598986a7047472edd0ef6b88c19713128919246a4536230a57005698d603e6a1c67fd4cf8552007e1e187a17e19ba8ad1f6861c0fbf3574b0eece8b839bc45665b7abceffa4dfd2904486818fe15ded5c801d2d8d696b56cf344930cefaead336a53a6483fa220c83f8254367b29309fba18366fc7c0626abbbf90af6d5012bd5e84dbce2c9e3dd482a260747533f98a193bdb056d7d2dc5aac42fc0b535c407ac568337f4eb76848b79231d2d48c6f470eb56a42a06810d379888acd4e5958334ae5a1f12e35c85b7f57f5d3b8e31cc88e253ef356dafeb85b2e0ddd75c06a350527c71cd82e49b2175ef5b1cb8e6577d2596d66eb07dc8be3aa12a4dd63d03f45552e56069705c2da8606d4ea8beafdfbf47a2aaf0cb0af8b911e1d7fd4ad0082057b686adeefd011406441fdd1cae66788224aea3a32be4e31cd2c21cc5888323897e22347b7f3511315258cbe65fb49e58a71592d8eca237d10815a8835cf1e5358a06e5165ade816917b7ba559534f15f81cf6aaf5db4a78abac1d039872ca95b63391e1b775c64a90306e64e919450b68f60078d76dea61ce530794de18c2c8441b7a9f7a1f322692cdddcb3dc7d65f0224d6ecc8f9ae03fc7a28f6686404eac22ef54e6a02aefd911180ba7c309284f4cef6a1a73345b0a9b61f0693dc4506968d4b341067ecb3caee046ef7281ba9c6fd62ca9331acb895870ed47c8fbdf8be21421f5284c124f1dc2d937ba9aecdb7c08e9d36ece295b95c0699f20d1cec8c38b76bc651d10aaba980a63fd95d481ffd73a6bdfe1bf4f1ec6cba4c60471afb9d2713ee44416936d458c5e4ca8d9532c7ac316d6220a9f212134444fd94b356d2b8880b9cc0db092af28cb1c66164f7ac029ef7d5b251a4f1b9e5c2c0519c0d4e3dfe8bd763ecf7c467a8d48ef9e6a476690591a54451cd2cf5c5c9a1c4130a0cd6d3091bf46bf0b0b0f4f05f35ef55ae87d06eaf6863f48db7b101e2023ae2fc46e270c11ff16aae0d32f10ae76ae63f351bfa25fcb8f36713ab90647d4f67beb1d4e9d1594cf8fcf6b8a72799f65d6e60278ebda9e8bf1e4a44e8bd904f2815b4ca124ac4dd8a69147d1c8a44283a5f8953f2cb0d4bf2403685c6c68f4fbfe6f657f8b644d869713f226181335bdfe312b6232180dfe8216aebdb44002564f82bbc58d45d10a6bc7bd2321ebab580e7a4049fd2ef530d14372904291fbbec395eb1f447e9277ddc9dfd423ff20ede05df6938962edff989ffa08c33cbddcd628bf26f08161792a1c284cb2a4974e6f8886fbcda0930181991c03107c690c9c7be21f8e3b859765aeb5ac013864f85643a659d2c9804ec4b38e6c40fb38e8fc300ec7e56c6f9de7032100551f8fb57d9a63cbeba3aca9e87b2a6a5bc9f9e9e7720ed90c1708de962ccfcc5d56fe54667378941d432289fff91d5d06aefde11d80ddb47c0e33bb59de9880bbe1c9373fe017dc4c14dc058b3607ce2207506572fadf455a1c99f5d72fbb2b6594a841eb5879d8b3d66ed8e8877d3fea688cae92a17231d0fd54bceec8f6213f7ed", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:38 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000fc00"}, 0x1c) 13:14:38 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:38 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 13:14:38 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:38 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:38 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 13:14:38 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000fc00"}, 0x1c) 13:14:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:38 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:38 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ff00"}, 0x1c) 13:14:38 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:39 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:39 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000001000"}, 0x1c) 13:14:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x7, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:39 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000000001"}, 0x1c) 13:14:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x0, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, &(0x7f00000016c0)=[{&(0x7f0000000080)="bdd1b73e660cf491341bec14f0c0b59307ee5b7cb94c4f67cd43bd068c0aa8dc3e1e8af542371116d8b929fb2debe046a26ace42e3ec57b06a9a6f5066ff95457f6f255efcb277241dee3e2679d8d42415072ef404e747f15956", 0x5a, 0x81}, {&(0x7f0000000100)="9e986b704d6b09097b347c830517b0892906a746a31792d9c7b71a859768c2beb19ba560bdfbdee828f50d", 0x2b, 0x2db7f873}, {&(0x7f0000000180)="d830ad370c66e7b7eeadad0db7e78391f978c99aca007a765afec86d5fd552838a773fb87f0e3f0c5577c075620b5e53f7857ca10615f7e504cc9bf5e82e24f20baabd9ccbe25fd014c88974b7a939296b5fe3dba4256f3e115cf0e10c9cef18e33fa85ba17d965e666c8e2e9051f7ab18f66cbaf1f1075d47584134b3a936554b88cc99f95ad572e7b489636fa4594174979ff108395b03a4490f087ffe8219f39c36373c8cdd2db878a94fbdc817f1caa57d3a46bc657ca4eeb201d9eb4cf1e79f8fb6e424622dcfc143df4f2d9e9fec09412a85188cdcb81d4c2a7bbd385918cde90416ec40c5fef3244afd7c856e63677c08bde63aaeae407412af0287ccee0e73fa436db97949c7c69ac7ccc171c6b2681b3b5e01cdf4d44197603d4437dded6cbd7615064b88c496e2032b8bdb455ab9b46b49aa7b81abe3f0eb1aba2fd987a83ac25874f307a7fcbc335c17ee6003fde1b8b95f9d8d431d515ad990cd76f2deadd3a75043e69cc32a6486fc089be934256e82bc6c4ec9d57c6630ab7a1f1574105b5bbfe6f9ad82a0d063aa0158c0ad6202c6a4489013b46f5b110a55e758eb8b739afc48ad7daa2032124e085286bfa6807bd01f23a66602295bfd9686d0d2ffc2a0793634e354bef56b2067defc904f6c772c51884b7b902fb6fae15cf2964cd26256ab66ad60843c9195f28214fad4e55c8fab9341d710a1ade720ddb4cd7c9d0366a9d40d3d268ad41f760b14884ccf6882c0a73dccade1b9261793fa2b75c73fe559f8936cad08ada84e405821e8417b2cb6d5b1cb3d29a7421eb40d11d43a02b26c3a33468950a8169817017cb68bffb82ef21993ac6c3659f01e0d3b09489f714d4a3b51d539dd6a89453f8da9ae4e1eaa41af0922ffb609877fdaa2b433ad8e12e30f3f3888c583a2009cb77a265340c4b295a36acff556b6ab165d79446297b91019886c18943b76b4ca338fb0e3d90da59d5eb6bc222a3148fae1612316da368bb2d4f6532007168df28bc4f0cafec18f751708672cc06cf0aa9589aa42e9140511afea3488f86e78fbe39f852e65fbf476b6df82bfaa898fb94c3761c28a47233d9094d9b99fb2c65bee143802800b98860e1712d6c607159bcb6c7132955282eb1d1bda80581221d525b18d541b9e7645bde76a4107c11c295d38d582402aaaf9fcc8baaf15a6863115cfbb74b161adae45f68bd87504a78bfcc024457901f6b8b35b782ea81fa2872976674a6d65218bd3b1127e144777b2fd03beb499a76fd7920d4d8b914fe1398f0dfedd2910bdc7ff2a5342f45c2aa8d77ad39a46486cae52d7c7e7e3b6b9a9f71632a4ff24fd2e6be246a962b168937707370126bfaa68c7c33db92bc61b7d2050e3e0822800612f3a26ff9b272c0103e620afb0f76f1115e86b122d192c9e0d97504f8b7a27ba810afc3ededfc663865739827713789f96e9f2d1c8fd0f4e5fccb231e2aeed8a3fbaf0d7502582985ab1b5b238b4eeed450482323ea403a5ea38e49d831e9dfe7b4cd2d562b405b721f814e400824bd6cafa7800338ad517fe4395652dd46c81099e75a1d0f35b54adb3d3211e866fead4d0cbab4e81192fd8cc28a706203fc26695149e463b1acdfcf0b54da366f98e38db5fbbcc54a0989a3f7fea6b6e593a15bbb490a9465df20dca10b0496343045050d369db0c5ea65f637a8bc83861005bbf0e20d702c3f4b340b5a3f14a5f4f04a4c0b032a7f0f63c265555ab686fb48bc7794740aba1bd3153fd72f265373f99b700aaa19bc4e37c2a3a6174638d137ce5ddc1c8d9308a1751fae7099c93b0269a9e37b593a9faf3373a12901cb0d756520b1c0210f8f1af83e28d676d60c28093daf7edde180d5d4b7bb373c82906f5ad30439e2e4e982f957bceb2882f4ce9b0d5ca43dbafe956a6267adff4f802b64db92389c243214e5f0520ad5011fd16e3571454964e4968e5b5532db60d7e02e6a791b2641ce59b49febdf9880c5dde41166db16710407f8a45d1eb1aacb775a31c667de97efed170c1bf1516685502cf6bc9372f7873c2c83fc212f71189fbdb29496e82985a6683a8f38dbff0155bd4edb6407989ed6a1a8a230913d633001722d5f8a959edf9fadaeefd1b4001c1d8520b9721e430cb30312683b02d376aecfaf406cb449b5d4fc480a9e011e0eb43ccc177818228a049f6f90c07cbff926c4300e81d2621012a3860d13a85789a930b37e31e8e1841936465b567ce8ffda792751f19df1bf47dfb2cabe3d93fee60bf5e5dcbcc5c307fe40648d943b156e5efb3a90a3f364090299d8d58948eeba81e81219910a2ee0191e7ce9bdb50b706baa83ad72fa9fb1d98ee071ba353828419e536b50a071d80e782dc978687a9b0167821b71f3138936e455337f076b1eea450f053007d4167d6ee93829871f378713bbc9283252695ea5d4982e1e659c68778cb88b170268e2bae14cd8257ab707333f25b4786dd20672d8a02a10e0e5fd3ef2a9842f42c79e5465d565555bd7569fc52f414f2fadce17b8ac6b57d883e56d6016472a3fed7db8db80be06d9ff964a3c33b76366856ede8436c56cfa4531d75a8d81362475680e3c940ee104014db4ce284dbc06c3f0556cbeda76847fd513411e3fd5c452edf6f8f39f65624cc2287388d55e4ad2a67eea2dc8a694bf51ca4465305326d7ba2b9b93d30eae1f7c52092198bbf26d08ef8552e5d5be392fea78652e58df476d10bb630229900b3c8b714854e3a9c994e990b0be370387f7b5954d1a176d85e0e4d3a4b39a7c36a122e1233754edc4787833fa57fae554b8dc5d10bdceb0bdce918145600e4cd005739dce76d4db9254c2437202a6098c2dd249b029bc71023f1534736b917b22bc550d8a9971365ee39fb5cc5ac5824283fa02bca67d7bb399ef3729c50b059b188c45899bfd827a7cb694ca9213c418dafa41d4d28e150f279f7fb199f56e7c629151f02c60d5d22457dff0942b0e9931f726dc6b4a7f09d668807f825115542f25800557e5bac0aaf8850a119e199f08d9909bbb5f62ea42473f56edb1dd68ef505c26d75065ca5dc74f33fb6cb7ded2ea93e2032cd528a36446024be5b0376081ec1666dd90bf0a27cee907010f9c0122583e1e17eba819f96734ebd3a55283325649307e20701fb9ba6ceda2550e1eb33c822d663506d2e551e1af636b50ff4c79c01b5d709a3caf033b8a98368e6e68eefe7ee8bcda1a828bcbea8d411ae3bfedcbb34d35b7e68448a38ac6b06577bb6a4d826d87b3bdccc7df437a0d19663fc32afef8e6ca697e7765482aa76e029534c0a09e5675255df37cf00cdacb4c0a10065d30601b81f04fa9d28aeb6bab653ae61f7f3864368a3d4545eff25538f716682b9af83d118f04fbc76ad4fab18f3bc72f97d3388976894310eb8dafe9450d57ff11e4c1c8c68df4b3d7f70f3049eded6d0bc5ddc89a5b5e24ff6df5939112d1ae19e0c58e10132078c065854aa1901bec3b308ea5f32b5e5e694dc1b474ab3d9c58fa9216f4273fdb8083072cc7a7969c5755da9bbb5d9d6b8bb1d16027e4d53e2fd34df6684847c76dac8b3b67b19818eaa4ddaaf81215551aa37319efa133d218b241c3bb4349f2ee0548c078fd07d320d3169cca390c4e070d518858de91927022002be1c72fca28dec5e5b35080e9afb6a55beac3e76384fabce1a063aba57c30bb3778cff612f988f89d95ca49b2de329f30c673ab4b5dbd97c0b8efc45755ce1bf3ec46981ad832765f3bb3bce5974e922c58a8ca06cd05fd770708c7b4b2024fef2e411b66d4f458aa3b29efd614110c61388827ea12446990923a1a5e32ddfa35a88aff792398affcba6d7e2c2d23b72e0e8f95719e1484aadaa6e80196fbdb873b0d3cec6808569b5510568cff333cd9464b04f1a8f9626788fe7ee70221a3a1daef48fa136a84cbf419f7f2035876a23c7a843d77950d0d178e1875b999af0579e1191664b6a495621dcf4bcdb0dc4b3ae02f1da840987b26c22d75f390e2d0472716ae93051c14b4db0c07c77704e58dd366833579ce026f837bde6a49f3546f265e8faa136915c09ed29462565b4dc334ba7364046ca88b518d86f88629238969fe71fbb325532af67231ef097be8cbbb9a1217e198b62266a2b5dc61a810a3bde0f4ae3b0882bbd7a9661b2737add29b312831a04062ca318710463fa30ca0e25aa2d57dffcedb78598986a7047472edd0ef6b88c19713128919246a4536230a57005698d603e6a1c67fd4cf8552007e1e187a17e19ba8ad1f6861c0fbf3574b0eece8b839bc45665b7abceffa4dfd2904486818fe15ded5c801d2d8d696b56cf344930cefaead336a53a6483fa220c83f8254367b29309fba18366fc7c0626abbbf90af6d5012bd5e84dbce2c9e3dd482a260747533f98a193bdb056d7d2dc5aac42fc0b535c407ac568337f4eb76848b79231d2d48c6f470eb56a42a06810d379888acd4e5958334ae5a1f12e35c85b7f57f5d3b8e31cc88e253ef356dafeb85b2e0ddd75c06a350527c71cd82e49b2175ef5b1cb8e6577d2596d66eb07dc8be3aa12a4dd63d03f45552e56069705c2da8606d4ea8beafdfbf47a2aaf0cb0af8b911e1d7fd4ad0082057b686adeefd011406441fdd1cae66788224aea3a32be4e31cd2c21cc5888323897e22347b7f3511315258cbe65fb49e58a71592d8eca237d10815a8835cf1e5358a06e5165ade816917b7ba559534f15f81cf6aaf5db4a78abac1d039872ca95b63391e1b775c64a90306e64e919450b68f60078d76dea61ce530794de18c2c8441b7a9f7a1f322692cdddcb3dc7d65f0224d6ecc8f9ae03fc7a28f6686404eac22ef54e6a02aefd911180ba7c309284f4cef6a1a73345b0a9b61f0693dc4506968d4b341067ecb3caee046ef7281ba9c6fd62ca9331acb895870ed47c8fbdf8be21421f5284c124f1dc2d937ba9aecdb7c08e9d36ece295b95c0699f20d1cec8c38b76bc651d10aaba980a63fd95d481ffd73a6bdfe1bf4f1ec6cba4c60471afb9d2713ee44416936d458c5e4ca8d9532c7ac316d6220a9f212134444fd94b356d2b8880b9cc0db092af28cb1c66164f7ac029ef7d5b251a4f1b9e5c2c0519c0d4e3dfe8bd763ecf7c467a8d48ef9e6a476690591a54451cd2cf5c5c9a1c4130a0cd6d3091bf46bf0b0b0f4f05f35ef55ae87d06eaf6863f48db7b101e2023ae2fc46e270c11ff16aae0d32f10ae76ae63f351bfa25fcb8f36713ab90647d4f67beb1d4e9d1594cf8fcf6b8a72799f65d6e60278ebda9e8bf1e4a44e8bd904f2815b4ca124ac4dd8a69147d1c8a44283a5f8953f2cb0d4bf2403685c6c68f4fbfe6f657f8b644d869713f226181335bdfe312b6232180dfe8216aebdb44002564f82bbc58d45d10a6bc7bd2321ebab580e7a4049fd2ef530d14372904291fbbec395eb1f447e9277ddc9dfd423ff20ede05df6938962edff989ffa08c33cbddcd628bf26f08161792a1c284cb2a4974e6f8886fbcda0930181991c03107c690c9c7be21f8e3b859765aeb5ac013864f85643a659d2c9804ec4b38e6c40fb38e8fc300ec7e56c6f9de7032100551f8fb57d9a63cbeba3aca9e87b2a6a5bc9f9e9e7720ed90c1708de962ccfcc5d56fe54667378941d432289fff91d5d06aefde11d80ddb47c0e33bb59de9880bbe1c9373fe017dc4c14dc058b3607ce2207506572fadf455a1c99f5d72fbb2b6594a841eb5879d8b3d66ed8e8877d3fea688cae92a17231d0fd54bceec8f6213f7ed", 0x1000, 0x8}, {&(0x7f0000001180)="8cf298b491", 0x5, 0x1}, {&(0x7f00000011c0)="06f78960f6e1303aa7b3d3b2f7d67c7ad7959ed7dda2838475900b5e2b7f469571a5bb0aa1da88792f3e79e97bebdb400849f08afd0703fe5c0ee4134445110e0b77b3fd43400471de758abe9df95875f92b84198dab6c899e2f5854c6dd213eed45025e08a22fdfd8eaac2573aa3b9262f7c231a86aeb9856f4d156ee054995d8321421a6318f063086359ea34415077db293d5123eb9de27969d8ae97af21c3a40a4353f23d850f48235055a448c98a97b8bb023d8c96d4eeb6b0ef9ff8fbae171", 0xc2, 0x1}, {&(0x7f00000012c0)="c98a5b458d4ba81a525abd06711e8b1734a8b143d089706fe58a5fea85401ffa989ce6394952a6e0c7f895691930771fa44615dcd791d50ab2e2175cac32ad82a61952d86016f9c396ace92167c06e796202b6bc72d2d04be2af4714c2a6d7113fb90a63594c94c73be989fbf3640b827a0edfe306fc601e4e9ba3c47fd08f2d9fc9c42cb613aa", 0x87, 0x4}, {&(0x7f0000001480)="e29ea9798933b627ee736d400b870987e06f4b62a5e300a726dc313d012b2e7f641d7803400dc785d2ffd9483a0cae1c211e1acbd5fdd204940d1d52be4b20c6618efc2f6c0cd32976954c2f8998a439e8a924d96edf2c82d86d3d3a2c6f1136b892e894ea088c8527d251aa0248fb7d533d630951d936f69f2c79ae5140210c8a0e266828d3667adc698adf431fd36de361871aee197a59cb44", 0x9a, 0x9}, {&(0x7f0000001380)="89e977aebe46249967c402ad3352a13c36", 0x11, 0x2}, {&(0x7f0000001540)="9657723bcabc2914cdf7ac708285556c9a8c360a5b1d1977c7c4e7206c430f5d0eb1cf3ecf8c95a57d9a0aa3357a7c69a49d86b8758a5578026f4131a6a6c6eb66ab4033585576327f4518a08732ad9c0b4084828c", 0x55, 0x1}, {&(0x7f00000015c0)="040a4bc6c55110c38ffc99933f9bcba93b54a662307d0bc67b5b6cf84e9963de811510765cfde04c3968bd0135625fdde30949b892505d562f2995501f2bf687e205ffad8f23f79b1336d4913c7001fbadcc72843675df690b47fbe3de0593cf7c6b8347587abc959a9eef4eaa2b6952e6b1690ac1d2aa3d5770a84129b16b7d3051180db17cc8982147690b6d4b010d0b53bafe0184c5e57a53fe9016e42e034667c2b04a8b9ccb1a813e0d4a2f3cc674f55093394910e2a1b00eb0de5853f2fecd2e6fbef4493d7b7aa830ab6f752af1f5b47f429810b9c310ab8f3e1a8043ec87205c309c32f0d1a601751c49851d08377bd09d49", 0xf6, 0x3}], 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x700) 13:14:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:39 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?'}, 0x1c) 13:14:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x0, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) [ 290.116206][T19569] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:39 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x700) 13:14:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x0, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:39 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@'}, 0x1c) 13:14:39 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:39 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000ffffffe0"}, 0x1c) 13:14:39 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) [ 290.394592][T19598] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x700) 13:14:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}, {@qnoenforce='qnoenforce'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:40 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000fc"}, 0x1c) 13:14:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) [ 290.731199][T19642] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:40 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000ffff80fe"}, 0x1c) 13:14:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:14:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:40 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000ffffc0fe"}, 0x1c) 13:14:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:40 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) [ 291.125495][T19677] XFS (loop4): Invalid superblock magic number 13:14:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:40 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:40 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:14:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:14:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:41 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) 13:14:41 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:41 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000fe80ffff"}, 0x1c) 13:14:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) [ 291.693942][T19738] XFS (loop4): Invalid superblock magic number 13:14:41 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000fec0ffff"}, 0x1c) 13:14:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:14:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:41 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000e0ffffff"}, 0x1c) 13:14:41 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x0, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) [ 292.210828][T19785] XFS (loop4): Invalid superblock magic number 13:14:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}, {@wsync='wsync'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:42 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x0, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x0, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:42 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) [ 292.635438][T19831] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:42 executing program 3: socket$inet6(0xa, 0x5, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}, {@inode64='inode64'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:42 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:42 executing program 3: socket$inet6(0xa, 0x5, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) [ 292.945761][T19861] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:42 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}, {@nolargeio='nolargeio'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:42 executing program 3: socket$inet6(0xa, 0x5, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20}, 0x1c) 13:14:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:42 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, 0x0, 0x0) [ 293.200088][T19895] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, 0x0, 0x0, 0x8f) 13:14:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, 0x0, 0x0) 13:14:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:42 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, 0x0, 0x0, 0x8f) 13:14:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) [ 293.462714][T19924] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, 0x0, 0x0) 13:14:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, 0x0, 0x0, 0x8f) 13:14:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2}, 0x1c) 13:14:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000000000000000) [ 293.793710][T19956] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2}, 0x1c) 13:14:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x2}, 0x1c) 13:14:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000001000"}, 0x1c) [ 294.091592][T19988] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x7a) 13:14:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@noalign='noalign'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000fc00"}, 0x1c) 13:14:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000000000000000) 13:14:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) [ 294.363930][T20021] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@filestreams='filestreams'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x4000000000000000) 13:14:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 13:14:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 294.600113][T20042] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x4000000000000000) 13:14:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000fc00"}, 0x1c) 13:14:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x4000000000000000) 13:14:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ff00"}, 0x1c) 13:14:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) [ 294.938504][T20073] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000000010"}, 0x1c) [ 295.132818][T20092] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@quota='quota'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 295.387505][T20113] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@logbufs={'logbufs'}}, {@filestreams='filestreams'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:45 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:45 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 295.618229][T20136] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x500) 13:14:45 executing program 5 (fault-call:3 fault-nth:0): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:45 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ffffff"}, 0x1c) 13:14:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@uquota='uquota'}, {@filestreams='filestreams'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x500) [ 295.907443][T20159] FAULT_INJECTION: forcing a failure. [ 295.907443][T20159] name failslab, interval 1, probability 0, space 0, times 0 [ 295.971669][T20176] XFS (loop4): unknown mount option [fsname=net/ip_vs]. [ 295.978958][T20159] CPU: 1 PID: 20159 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #68 [ 295.987050][T20159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.997123][T20159] Call Trace: [ 296.000445][T20159] dump_stack+0x1d8/0x2f8 [ 296.004798][T20159] should_fail+0x555/0x770 [ 296.009241][T20159] __should_failslab+0x11a/0x160 [ 296.014214][T20159] ? kmalloc_array+0x2f/0x50 [ 296.018827][T20159] should_failslab+0x9/0x20 [ 296.023437][T20159] __kmalloc+0x7a/0x340 [ 296.027621][T20159] kmalloc_array+0x2f/0x50 [ 296.032048][T20159] rw_copy_check_uvector+0x96/0x360 [ 296.037353][T20159] import_iovec+0x8c/0x2b0 [ 296.041789][T20159] do_preadv+0x146/0x290 [ 296.046070][T20159] ? check_preemption_disabled+0xa9/0x2a0 [ 296.051814][T20159] ? retint_kernel+0x2b/0x2b [ 296.056414][T20159] __x64_sys_preadv+0x9e/0xb0 [ 296.061192][T20159] do_syscall_64+0xfe/0x140 [ 296.065704][T20159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.071629][T20159] RIP: 0033:0x459829 [ 296.075524][T20159] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.095321][T20159] RSP: 002b:00007f5ed8f37c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 296.095333][T20159] RAX: ffffffffffffffda RBX: 00007f5ed8f37c90 RCX: 0000000000459829 [ 296.095338][T20159] RDX: 000000000000033d RSI: 00000000200017c0 RDI: 0000000000000003 13:14:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x700) 13:14:45 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x300) 13:14:45 executing program 5 (fault-call:3 fault-nth:1): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x500) [ 296.095343][T20159] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.095347][T20159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ed8f386d4 [ 296.095361][T20159] R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000005 13:14:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@uid_eq={'uid'}}]}) 13:14:45 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ffff80"}, 0x1c) 13:14:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x300) 13:14:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x700) [ 296.234246][T20187] FAULT_INJECTION: forcing a failure. [ 296.234246][T20187] name failslab, interval 1, probability 0, space 0, times 0 [ 296.323033][T20200] XFS (loop4): unknown mount option [fsname=net/ip_vs]. [ 296.328863][T20187] CPU: 1 PID: 20187 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #68 [ 296.338007][T20187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.348676][T20187] Call Trace: [ 296.351978][T20187] dump_stack+0x1d8/0x2f8 [ 296.356314][T20187] should_fail+0x555/0x770 [ 296.360747][T20187] __should_failslab+0x11a/0x160 [ 296.365699][T20187] should_failslab+0x9/0x20 [ 296.371729][T20187] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 296.377497][T20187] ? __kmalloc_node+0x3c/0x60 [ 296.382202][T20187] __kmalloc_node+0x3c/0x60 [ 296.382216][T20187] kvmalloc_node+0xcc/0x130 [ 296.382227][T20187] seq_read+0x223/0xd70 [ 296.382247][T20187] ? fsnotify+0x1318/0x13d0 [ 296.391284][T20187] ? check_preemption_disabled+0xa9/0x2a0 [ 296.391297][T20187] ? seq_open+0x180/0x180 [ 296.391308][T20187] proc_reg_read+0x1e2/0x2d0 [ 296.391322][T20187] do_iter_read+0x4b1/0x5b0 [ 296.391336][T20187] do_preadv+0x178/0x290 13:14:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 296.391344][T20187] ? check_preemption_disabled+0xb7/0x2a0 [ 296.391358][T20187] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 296.391371][T20187] ? prepare_exit_to_usermode+0x1f7/0x580 [ 296.391383][T20187] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 296.391397][T20187] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 296.452240][T20187] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 296.457967][T20187] __x64_sys_preadv+0x9e/0xb0 [ 296.462653][T20187] do_syscall_64+0xfe/0x140 [ 296.467349][T20187] entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:14:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x700) 13:14:46 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x300) [ 296.473254][T20187] RIP: 0033:0x459829 [ 296.477149][T20187] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.496762][T20187] RSP: 002b:00007f5ed8f37c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 296.505187][T20187] RAX: ffffffffffffffda RBX: 00007f5ed8f37c90 RCX: 0000000000459829 [ 296.513287][T20187] RDX: 000000000000033d RSI: 00000000200017c0 RDI: 0000000000000003 13:14:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:46 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000ffffc0"}, 0x1c) 13:14:46 executing program 5 (fault-call:3 fault-nth:2): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 296.521267][T20187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.529246][T20187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ed8f386d4 [ 296.537226][T20187] R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000005 13:14:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}]}) 13:14:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x700) 13:14:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:46 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 296.690083][T20227] FAULT_INJECTION: forcing a failure. [ 296.690083][T20227] name failslab, interval 1, probability 0, space 0, times 0 [ 296.753609][T20233] XFS (loop4): unknown mount option [fsname=net/ip_vs]. [ 296.767114][T20227] CPU: 0 PID: 20227 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #68 [ 296.775217][T20227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.785412][T20227] Call Trace: [ 296.788717][T20227] dump_stack+0x1d8/0x2f8 [ 296.793068][T20227] should_fail+0x555/0x770 [ 296.797499][T20227] __should_failslab+0x11a/0x160 13:14:46 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 296.802442][T20227] should_failslab+0x9/0x20 [ 296.806949][T20227] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 296.812670][T20227] ? __kmalloc_node+0x3c/0x60 [ 296.817367][T20227] ? cache_grow_end+0x143/0x170 [ 296.822240][T20227] __kmalloc_node+0x3c/0x60 [ 296.826774][T20227] kvmalloc_node+0xcc/0x130 [ 296.831286][T20227] seq_read+0x223/0xd70 [ 296.835453][T20227] ? check_preemption_disabled+0xa9/0x2a0 [ 296.841300][T20227] ? retint_kernel+0x2b/0x2b [ 296.845898][T20227] ? proc_reg_read+0x124/0x2d0 [ 296.850694][T20227] ? proc_reg_read+0x1d0/0x2d0 [ 296.855796][T20227] ? seq_open+0x180/0x180 [ 296.860119][T20227] proc_reg_read+0x1e2/0x2d0 [ 296.864820][T20227] do_iter_read+0x4b1/0x5b0 [ 296.869326][T20227] do_preadv+0x178/0x290 [ 296.873734][T20227] ? check_preemption_disabled+0xb7/0x2a0 [ 296.879470][T20227] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 296.885543][T20227] ? prepare_exit_to_usermode+0x1f7/0x580 [ 296.891383][T20227] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 296.897090][T20227] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 296.902540][T20227] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 296.908242][T20227] __x64_sys_preadv+0x9e/0xb0 [ 296.912991][T20227] do_syscall_64+0xfe/0x140 [ 296.917485][T20227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.924057][T20227] RIP: 0033:0x459829 [ 296.927945][T20227] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:14:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x700) 13:14:46 executing program 5 (fault-call:3 fault-nth:3): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 296.947840][T20227] RSP: 002b:00007f5ed8f37c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 296.956246][T20227] RAX: ffffffffffffffda RBX: 00007f5ed8f37c90 RCX: 0000000000459829 [ 296.964396][T20227] RDX: 000000000000033d RSI: 00000000200017c0 RDI: 0000000000000003 [ 296.972372][T20227] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.980349][T20227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ed8f386d4 [ 296.988700][T20227] R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000005 13:14:46 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:14:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}, {@uid_eq={'uid'}}]}) 13:14:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:46 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x700) [ 297.264499][T20272] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:46 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000fe80ff"}, 0x1c) 13:14:46 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:46 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:46 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}], [{@fsname={'fsname', 0x3d, 'net/ip_vs\x00'}}]}) 13:14:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:47 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000fec0ff"}, 0x1c) 13:14:47 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 297.541642][T20295] XFS (loop4): unknown mount option [fsname=net/ip_vs]. 13:14:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:47 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000e0ffff"}, 0x1c) 13:14:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8, 0x0) 13:14:47 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:47 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x325, 0x0) 13:14:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 297.863508][T20315] XFS (loop4): Invalid superblock magic number 13:14:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:47 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:47 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:47 executing program 2 (fault-call:3 fault-nth:0): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:47 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x2) 13:14:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 298.272160][T20369] FAULT_INJECTION: forcing a failure. [ 298.272160][T20369] name failslab, interval 1, probability 0, space 0, times 0 [ 298.296337][T20372] FAULT_INJECTION: forcing a failure. [ 298.296337][T20372] name failslab, interval 1, probability 0, space 0, times 0 [ 298.313332][T20369] CPU: 1 PID: 20369 Comm: syz-executor.2 Not tainted 5.3.0-rc3+ #68 [ 298.321348][T20369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.331507][T20369] Call Trace: [ 298.334815][T20369] dump_stack+0x1d8/0x2f8 [ 298.339171][T20369] should_fail+0x555/0x770 [ 298.343622][T20369] __should_failslab+0x11a/0x160 [ 298.348605][T20369] ? kmalloc_array+0x2f/0x50 [ 298.353469][T20369] should_failslab+0x9/0x20 [ 298.357988][T20369] __kmalloc+0x7a/0x340 [ 298.362151][T20369] kmalloc_array+0x2f/0x50 [ 298.366588][T20369] rw_copy_check_uvector+0x96/0x360 [ 298.373267][T20369] ? rcu_lock_release+0x26/0x30 [ 298.378125][T20369] ? __fget+0x4e6/0x510 [ 298.382294][T20369] import_iovec+0x8c/0x2b0 [ 298.386724][T20369] do_preadv+0x146/0x290 [ 298.390971][T20369] ? _raw_spin_unlock_irq+0x69/0x80 [ 298.396194][T20369] ? __schedule+0x998/0xc50 [ 298.400699][T20369] ? check_preemption_disabled+0xb7/0x2a0 [ 298.406512][T20369] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 298.411966][T20369] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 298.417685][T20369] __x64_sys_preadv+0x9e/0xb0 [ 298.422469][T20369] do_syscall_64+0xfe/0x140 [ 298.426980][T20369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.432870][T20369] RIP: 0033:0x459829 [ 298.432882][T20369] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.432887][T20369] RSP: 002b:00007face1baec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 298.432896][T20369] RAX: ffffffffffffffda RBX: 00007face1baec90 RCX: 0000000000459829 [ 298.432901][T20369] RDX: 000000000000033d RSI: 00000000200017c0 RDI: 0000000000000003 [ 298.432906][T20369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.432912][T20369] R10: 0000000000000700 R11: 0000000000000246 R12: 00007face1baf6d4 [ 298.432917][T20369] R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000005 [ 298.440705][T20372] CPU: 1 PID: 20372 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 298.464887][T20372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.464893][T20372] Call Trace: [ 298.464911][T20372] dump_stack+0x1d8/0x2f8 [ 298.464925][T20372] should_fail+0x555/0x770 [ 298.464946][T20372] __should_failslab+0x11a/0x160 [ 298.480895][T20372] ? __se_sys_memfd_create+0x10a/0x4b0 [ 298.480908][T20372] should_failslab+0x9/0x20 [ 298.480920][T20372] __kmalloc+0x7a/0x340 [ 298.480932][T20372] __se_sys_memfd_create+0x10a/0x4b0 [ 298.480943][T20372] ? do_syscall_64+0x1d/0x140 [ 298.480953][T20372] __x64_sys_memfd_create+0x5b/0x70 [ 298.480968][T20372] do_syscall_64+0xfe/0x140 [ 298.550111][T20372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.573921][T20372] RIP: 0033:0x459829 [ 298.573932][T20372] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.573937][T20372] RSP: 002b:00007f900e760a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.573946][T20372] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 13:14:48 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:48 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:48 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x3) 13:14:48 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) [ 298.573951][T20372] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 298.573957][T20372] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 298.573962][T20372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f900e7616d4 [ 298.573967][T20372] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:48 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:48 executing program 2 (fault-call:3 fault-nth:1): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 298.761484][T20399] FAULT_INJECTION: forcing a failure. [ 298.761484][T20399] name failslab, interval 1, probability 0, space 0, times 0 [ 298.812719][T20404] FAULT_INJECTION: forcing a failure. [ 298.812719][T20404] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 298.826061][T20404] CPU: 1 PID: 20404 Comm: syz-executor.2 Not tainted 5.3.0-rc3+ #68 [ 298.834085][T20404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.844530][T20404] Call Trace: [ 298.847827][T20404] dump_stack+0x1d8/0x2f8 [ 298.852210][T20404] should_fail+0x555/0x770 [ 298.856667][T20404] should_fail_alloc_page+0x55/0x60 [ 298.861867][T20404] prepare_alloc_pages+0x283/0x470 [ 298.861880][T20404] __alloc_pages_nodemask+0xb2/0x5d0 [ 298.861897][T20404] kmem_getpages+0x56/0xa20 [ 298.861932][T20404] ? trace_lock_release+0x135/0x1a0 [ 298.861948][T20404] cache_grow_begin+0x7e/0x2c0 [ 298.886820][T20404] cache_alloc_refill+0x311/0x3f0 [ 298.891880][T20404] ? check_preemption_disabled+0xb7/0x2a0 [ 298.897648][T20404] __kmalloc+0x318/0x340 [ 298.901895][T20404] ? kmalloc_array+0x2f/0x50 [ 298.906518][T20404] kmalloc_array+0x2f/0x50 [ 298.910969][T20404] rw_copy_check_uvector+0x96/0x360 [ 298.916173][T20404] ? rcu_lock_release+0x26/0x30 [ 298.921374][T20404] ? __fget+0x4e6/0x510 [ 298.925524][T20404] import_iovec+0x8c/0x2b0 [ 298.929970][T20404] do_preadv+0x146/0x290 [ 298.934207][T20404] ? check_preemption_disabled+0xb7/0x2a0 [ 298.939923][T20404] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 298.946005][T20404] ? prepare_exit_to_usermode+0x1f7/0x580 [ 298.951726][T20404] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 298.957450][T20404] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 298.963024][T20404] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 298.968781][T20404] __x64_sys_preadv+0x9e/0xb0 [ 298.973466][T20404] do_syscall_64+0xfe/0x140 [ 298.977987][T20404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.983878][T20404] RIP: 0033:0x459829 [ 298.987786][T20404] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:14:48 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 299.007388][T20404] RSP: 002b:00007face1baec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 299.015792][T20404] RAX: ffffffffffffffda RBX: 00007face1baec90 RCX: 0000000000459829 [ 299.023764][T20404] RDX: 000000000000033d RSI: 00000000200017c0 RDI: 0000000000000003 [ 299.031821][T20404] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.039791][T20404] R10: 0000000000000700 R11: 0000000000000246 R12: 00007face1baf6d4 [ 299.047770][T20404] R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000005 [ 299.065524][T20399] CPU: 0 PID: 20399 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 299.073543][T20399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.083808][T20399] Call Trace: [ 299.087109][T20399] dump_stack+0x1d8/0x2f8 [ 299.091470][T20399] should_fail+0x555/0x770 [ 299.095893][T20399] __should_failslab+0x11a/0x160 [ 299.100838][T20399] ? shmem_alloc_inode+0x1b/0x40 [ 299.105777][T20399] should_failslab+0x9/0x20 [ 299.110283][T20399] kmem_cache_alloc+0x56/0x2e0 13:14:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:48 executing program 2 (fault-call:3 fault-nth:2): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) [ 299.115315][T20399] ? shmem_fallocate+0xc90/0xc90 [ 299.120259][T20399] shmem_alloc_inode+0x1b/0x40 [ 299.120268][T20399] ? shmem_fallocate+0xc90/0xc90 [ 299.120278][T20399] new_inode_pseudo+0x68/0x240 [ 299.120286][T20399] new_inode+0x28/0x1c0 [ 299.120297][T20399] ? __kasan_check_read+0x11/0x20 [ 299.120312][T20399] shmem_get_inode+0x11b/0x700 [ 299.148798][T20399] ? __alloc_fd+0x58f/0x630 [ 299.153408][T20399] __shmem_file_setup+0x129/0x280 [ 299.158535][T20399] shmem_file_setup+0x2f/0x40 [ 299.163221][T20399] __se_sys_memfd_create+0x28e/0x4b0 [ 299.168554][T20399] ? do_syscall_64+0x1d/0x140 [ 299.173321][T20399] __x64_sys_memfd_create+0x5b/0x70 [ 299.178584][T20399] do_syscall_64+0xfe/0x140 [ 299.183205][T20399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.183563][T20419] FAULT_INJECTION: forcing a failure. [ 299.183563][T20419] name failslab, interval 1, probability 0, space 0, times 0 [ 299.189195][T20399] RIP: 0033:0x459829 [ 299.189207][T20399] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.189211][T20399] RSP: 002b:00007f900e760a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.189220][T20399] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 299.189226][T20399] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 299.189232][T20399] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 299.189237][T20399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f900e7616d4 13:14:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4) 13:14:48 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:48 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 299.189243][T20399] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 [ 299.319185][T20423] FAULT_INJECTION: forcing a failure. [ 299.319185][T20423] name failslab, interval 1, probability 0, space 0, times 0 [ 299.330794][T20419] CPU: 0 PID: 20419 Comm: syz-executor.2 Not tainted 5.3.0-rc3+ #68 [ 299.339839][T20419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.350078][T20419] Call Trace: [ 299.353385][T20419] dump_stack+0x1d8/0x2f8 [ 299.357727][T20419] should_fail+0x555/0x770 [ 299.362160][T20419] __should_failslab+0x11a/0x160 [ 299.367114][T20419] should_failslab+0x9/0x20 [ 299.371667][T20419] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 299.377443][T20419] ? __kmalloc_node+0x3c/0x60 [ 299.382128][T20419] ? __mutex_lock_common+0x513/0x2820 [ 299.387589][T20419] __kmalloc_node+0x3c/0x60 [ 299.392102][T20419] kvmalloc_node+0xcc/0x130 [ 299.396611][T20419] traverse+0xff/0x520 [ 299.400686][T20419] seq_read+0xcab/0xd70 [ 299.404854][T20419] ? fsnotify+0x1318/0x13d0 [ 299.409369][T20419] ? seq_open+0x180/0x180 [ 299.413705][T20419] proc_reg_read+0x1e2/0x2d0 [ 299.418296][T20419] do_iter_read+0x4b1/0x5b0 [ 299.422808][T20419] do_preadv+0x178/0x290 [ 299.427042][T20419] ? check_preemption_disabled+0xb7/0x2a0 [ 299.433027][T20419] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 299.439183][T20419] ? prepare_exit_to_usermode+0x1f7/0x580 [ 299.444929][T20419] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 299.450821][T20419] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 299.456275][T20419] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 299.462081][T20419] __x64_sys_preadv+0x9e/0xb0 [ 299.468168][T20419] do_syscall_64+0xfe/0x140 [ 299.472671][T20419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.478652][T20419] RIP: 0033:0x459829 [ 299.482632][T20419] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.502321][T20419] RSP: 002b:00007face1baec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 299.510736][T20419] RAX: ffffffffffffffda RBX: 00007face1baec90 RCX: 0000000000459829 [ 299.518706][T20419] RDX: 000000000000033d RSI: 00000000200017c0 RDI: 0000000000000003 [ 299.526683][T20419] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.534660][T20419] R10: 0000000000000700 R11: 0000000000000246 R12: 00007face1baf6d4 [ 299.542632][T20419] R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000005 [ 299.550620][T20423] CPU: 1 PID: 20423 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 299.558626][T20423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.568693][T20423] Call Trace: [ 299.572080][T20423] dump_stack+0x1d8/0x2f8 [ 299.576473][T20423] should_fail+0x555/0x770 [ 299.581083][T20423] __should_failslab+0x11a/0x160 [ 299.586503][T20423] ? security_inode_alloc+0x36/0x1e0 [ 299.591806][T20423] should_failslab+0x9/0x20 [ 299.596330][T20423] kmem_cache_alloc+0x56/0x2e0 [ 299.601289][T20423] security_inode_alloc+0x36/0x1e0 [ 299.606416][T20423] inode_init_always+0x3b5/0x8d0 [ 299.611367][T20423] ? shmem_fallocate+0xc90/0xc90 [ 299.616587][T20423] new_inode_pseudo+0x7f/0x240 [ 299.621355][T20423] new_inode+0x28/0x1c0 [ 299.621368][T20423] ? __kasan_check_read+0x11/0x20 [ 299.621380][T20423] shmem_get_inode+0x11b/0x700 [ 299.621388][T20423] ? __alloc_fd+0x58f/0x630 [ 299.621399][T20423] __shmem_file_setup+0x129/0x280 [ 299.621410][T20423] shmem_file_setup+0x2f/0x40 [ 299.621420][T20423] __se_sys_memfd_create+0x28e/0x4b0 [ 299.621430][T20423] ? do_syscall_64+0x1d/0x140 [ 299.621444][T20423] __x64_sys_memfd_create+0x5b/0x70 [ 299.644982][T20423] do_syscall_64+0xfe/0x140 [ 299.644998][T20423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.645013][T20423] RIP: 0033:0x459829 [ 299.655146][T20423] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.655152][T20423] RSP: 002b:00007f900e760a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.655163][T20423] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 13:14:49 executing program 2 (fault-call:3 fault-nth:3): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:49 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 299.655168][T20423] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 299.655186][T20423] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 299.723436][T20423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f900e7616d4 [ 299.723443][T20423] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:49 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:49 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x5) 13:14:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 299.916653][T20454] FAULT_INJECTION: forcing a failure. [ 299.916653][T20454] name failslab, interval 1, probability 0, space 0, times 0 13:14:49 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 300.111353][T20454] CPU: 0 PID: 20454 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 300.119385][T20454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.129568][T20454] Call Trace: [ 300.133178][T20454] dump_stack+0x1d8/0x2f8 [ 300.137525][T20454] should_fail+0x555/0x770 [ 300.141962][T20454] __should_failslab+0x11a/0x160 [ 300.146923][T20454] ? __d_alloc+0x2d/0x6e0 [ 300.151295][T20454] should_failslab+0x9/0x20 [ 300.155815][T20454] kmem_cache_alloc+0x56/0x2e0 [ 300.160605][T20454] __d_alloc+0x2d/0x6e0 [ 300.164759][T20454] ? lockdep_init_map+0x2a/0x680 [ 300.169718][T20454] d_alloc_pseudo+0x1d/0x70 [ 300.174302][T20454] alloc_file_pseudo+0xc3/0x260 [ 300.174319][T20454] __shmem_file_setup+0x1a2/0x280 [ 300.174330][T20454] shmem_file_setup+0x2f/0x40 [ 300.174341][T20454] __se_sys_memfd_create+0x28e/0x4b0 [ 300.174357][T20454] ? do_syscall_64+0x1d/0x140 [ 300.198845][T20454] __x64_sys_memfd_create+0x5b/0x70 [ 300.204169][T20454] do_syscall_64+0xfe/0x140 13:14:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 300.208689][T20454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.214698][T20454] RIP: 0033:0x459829 [ 300.218596][T20454] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.238209][T20454] RSP: 002b:00007f900e760a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.246626][T20454] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 13:14:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8, 0x700) 13:14:49 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:49 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x6) 13:14:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 300.246632][T20454] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 300.246637][T20454] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 300.246642][T20454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f900e7616d4 [ 300.246647][T20454] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x325, 0x700) 13:14:49 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x7) 13:14:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 300.451708][T20503] FAULT_INJECTION: forcing a failure. [ 300.451708][T20503] name failslab, interval 1, probability 0, space 0, times 0 [ 300.501630][T20503] CPU: 0 PID: 20503 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 300.509713][T20503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.519875][T20503] Call Trace: [ 300.523188][T20503] dump_stack+0x1d8/0x2f8 [ 300.527526][T20503] should_fail+0x555/0x770 [ 300.531952][T20503] __should_failslab+0x11a/0x160 [ 300.537081][T20503] ? __alloc_file+0x2c/0x390 [ 300.541765][T20503] should_failslab+0x9/0x20 [ 300.546282][T20503] kmem_cache_alloc+0x56/0x2e0 [ 300.551309][T20503] ? trace_lock_release+0x135/0x1a0 [ 300.556513][T20503] __alloc_file+0x2c/0x390 [ 300.560934][T20503] alloc_empty_file+0xac/0x1b0 [ 300.565709][T20503] alloc_file+0x60/0x4c0 [ 300.569957][T20503] alloc_file_pseudo+0x1d4/0x260 [ 300.574902][T20503] __shmem_file_setup+0x1a2/0x280 [ 300.579931][T20503] shmem_file_setup+0x2f/0x40 [ 300.584634][T20503] __se_sys_memfd_create+0x28e/0x4b0 [ 300.590118][T20503] ? do_syscall_64+0x1d/0x140 [ 300.594975][T20503] __x64_sys_memfd_create+0x5b/0x70 13:14:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) [ 300.600349][T20503] do_syscall_64+0xfe/0x140 [ 300.604857][T20503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.610766][T20503] RIP: 0033:0x459829 [ 300.610777][T20503] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.610782][T20503] RSP: 002b:00007f900e760a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.610791][T20503] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 13:14:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 300.610797][T20503] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 300.610803][T20503] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 300.610814][T20503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f900e7616d4 [ 300.674723][T20503] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:50 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:50 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000001000"}, 0x1c) 13:14:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8) 13:14:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:50 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000fc00"}, 0x1c) 13:14:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x702) 13:14:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x9) [ 300.896832][T20543] FAULT_INJECTION: forcing a failure. [ 300.896832][T20543] name failslab, interval 1, probability 0, space 0, times 0 [ 300.960699][T20543] CPU: 1 PID: 20543 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 300.968728][T20543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.978891][T20543] Call Trace: [ 300.982198][T20543] dump_stack+0x1d8/0x2f8 [ 300.982214][T20543] should_fail+0x555/0x770 [ 300.982228][T20543] __should_failslab+0x11a/0x160 [ 300.982239][T20543] ? security_file_alloc+0x36/0x200 [ 300.982252][T20543] should_failslab+0x9/0x20 [ 300.982263][T20543] kmem_cache_alloc+0x56/0x2e0 [ 300.982278][T20543] security_file_alloc+0x36/0x200 [ 300.982295][T20543] __alloc_file+0xde/0x390 [ 301.019962][T20543] alloc_empty_file+0xac/0x1b0 [ 301.024743][T20543] alloc_file+0x60/0x4c0 [ 301.028984][T20543] alloc_file_pseudo+0x1d4/0x260 [ 301.034117][T20543] __shmem_file_setup+0x1a2/0x280 [ 301.039140][T20543] shmem_file_setup+0x2f/0x40 [ 301.043813][T20543] __se_sys_memfd_create+0x28e/0x4b0 [ 301.049087][T20543] ? do_syscall_64+0x1d/0x140 [ 301.053869][T20543] __x64_sys_memfd_create+0x5b/0x70 [ 301.059074][T20543] do_syscall_64+0xfe/0x140 [ 301.063572][T20543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.069449][T20543] RIP: 0033:0x459829 [ 301.073354][T20543] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.092973][T20543] RSP: 002b:00007f900e760a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.101393][T20543] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 13:14:50 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?'}, 0x1c) 13:14:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 301.109380][T20543] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 301.117351][T20543] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 301.125318][T20543] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f900e7616d4 [ 301.133568][T20543] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:50 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@'}, 0x1c) 13:14:50 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:50 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000fc"}, 0x1c) 13:14:50 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) [ 301.319030][T20575] FAULT_INJECTION: forcing a failure. [ 301.319030][T20575] name failslab, interval 1, probability 0, space 0, times 0 [ 301.331978][T20575] CPU: 1 PID: 20575 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 301.339970][T20575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.350030][T20575] Call Trace: [ 301.353327][T20575] dump_stack+0x1d8/0x2f8 [ 301.357702][T20575] should_fail+0x555/0x770 [ 301.362143][T20575] __should_failslab+0x11a/0x160 [ 301.367149][T20575] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 301.372975][T20575] should_failslab+0x9/0x20 [ 301.377526][T20575] __kmalloc+0x7a/0x340 [ 301.381690][T20575] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 301.387415][T20575] tomoyo_realpath_from_path+0xdc/0x7c0 [ 301.392985][T20575] tomoyo_path_perm+0x192/0x850 [ 301.393000][T20575] ? trace_lock_release+0x135/0x1a0 [ 301.393026][T20575] tomoyo_path_truncate+0x1c/0x20 [ 301.393042][T20575] security_path_truncate+0xd5/0x150 [ 301.403309][T20575] do_sys_ftruncate+0x493/0x710 13:14:50 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 301.403324][T20575] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 301.403335][T20575] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 301.403344][T20575] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 301.403352][T20575] ? trace_hardirqs_off_caller+0x58/0x80 [ 301.403359][T20575] ? do_syscall_64+0x1d/0x140 [ 301.403369][T20575] __x64_sys_ftruncate+0x60/0x70 [ 301.403379][T20575] do_syscall_64+0xfe/0x140 [ 301.403393][T20575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.403402][T20575] RIP: 0033:0x4597f7 [ 301.403412][T20575] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.403417][T20575] RSP: 002b:00007f900e760a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 301.403426][T20575] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 301.403431][T20575] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 301.403436][T20575] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 13:14:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x703) 13:14:51 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xa) [ 301.403441][T20575] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 301.403446][T20575] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 [ 301.410647][T20575] ERROR: Out of memory at tomoyo_realpath_from_path. 13:14:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:51 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x500) [ 301.646623][T20575] XFS (loop4): Invalid superblock magic number 13:14:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x704) 13:14:51 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:51 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x500) 13:14:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xb) 13:14:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x705) 13:14:51 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) 13:14:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x500) [ 302.052360][T20641] FAULT_INJECTION: forcing a failure. [ 302.052360][T20641] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 302.065613][T20641] CPU: 1 PID: 20641 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 302.073593][T20641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.083842][T20641] Call Trace: [ 302.087175][T20641] dump_stack+0x1d8/0x2f8 [ 302.091552][T20641] should_fail+0x555/0x770 [ 302.095976][T20641] should_fail_alloc_page+0x55/0x60 13:14:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xc) [ 302.096000][T20641] prepare_alloc_pages+0x283/0x470 [ 302.106310][T20641] __alloc_pages_nodemask+0xb2/0x5d0 [ 302.111612][T20641] kmem_getpages+0x56/0xa20 [ 302.116127][T20641] cache_grow_begin+0x7e/0x2c0 [ 302.120899][T20641] cache_alloc_refill+0x311/0x3f0 [ 302.125961][T20641] ? check_preemption_disabled+0xb7/0x2a0 [ 302.131776][T20641] __kmalloc+0x318/0x340 [ 302.131790][T20641] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 302.131805][T20641] tomoyo_realpath_from_path+0xdc/0x7c0 [ 302.141763][T20641] tomoyo_path_perm+0x192/0x850 [ 302.141777][T20641] ? trace_lock_release+0x135/0x1a0 [ 302.141802][T20641] tomoyo_path_truncate+0x1c/0x20 [ 302.141819][T20641] security_path_truncate+0xd5/0x150 [ 302.157575][T20641] do_sys_ftruncate+0x493/0x710 [ 302.157598][T20641] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 302.172837][T20641] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 302.172858][T20641] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 302.189761][T20641] ? trace_hardirqs_off_caller+0x58/0x80 [ 302.195408][T20641] ? do_syscall_64+0x1d/0x140 13:14:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x500) 13:14:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x706) [ 302.200097][T20641] __x64_sys_ftruncate+0x60/0x70 [ 302.205065][T20641] do_syscall_64+0xfe/0x140 [ 302.209592][T20641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.215493][T20641] RIP: 0033:0x4597f7 [ 302.219433][T20641] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.239048][T20641] RSP: 002b:00007f900e760a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 13:14:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) [ 302.247525][T20641] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 302.255507][T20641] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 302.264618][T20641] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 302.272675][T20641] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 302.272682][T20641] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 [ 302.473030][T20641] XFS (loop4): Invalid superblock magic number 13:14:52 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xd) 13:14:52 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x500) 13:14:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x707) [ 302.798252][T20688] FAULT_INJECTION: forcing a failure. [ 302.798252][T20688] name failslab, interval 1, probability 0, space 0, times 0 [ 302.815186][T20688] CPU: 0 PID: 20688 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 302.823228][T20688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.833293][T20688] Call Trace: [ 302.836579][T20688] dump_stack+0x1d8/0x2f8 [ 302.841025][T20688] should_fail+0x555/0x770 [ 302.845457][T20688] __should_failslab+0x11a/0x160 [ 302.850510][T20688] ? tomoyo_encode2+0x273/0x5a0 [ 302.855452][T20688] should_failslab+0x9/0x20 [ 302.860080][T20688] __kmalloc+0x7a/0x340 [ 302.864701][T20688] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 302.870527][T20688] tomoyo_encode2+0x273/0x5a0 [ 302.875227][T20688] ? dynamic_dname+0xf0/0xf0 [ 302.879832][T20688] tomoyo_realpath_from_path+0x769/0x7c0 [ 302.885447][T20688] tomoyo_path_perm+0x192/0x850 [ 302.890290][T20688] ? trace_lock_release+0x135/0x1a0 [ 302.895591][T20688] tomoyo_path_truncate+0x1c/0x20 [ 302.900601][T20688] security_path_truncate+0xd5/0x150 [ 302.905900][T20688] do_sys_ftruncate+0x493/0x710 [ 302.910742][T20688] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 302.916467][T20688] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 302.921937][T20688] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 302.927645][T20688] ? trace_hardirqs_off_caller+0x58/0x80 [ 302.933289][T20688] ? do_syscall_64+0x1d/0x140 [ 302.937967][T20688] __x64_sys_ftruncate+0x60/0x70 [ 302.942889][T20688] do_syscall_64+0xfe/0x140 [ 302.947385][T20688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.953276][T20688] RIP: 0033:0x4597f7 [ 302.957271][T20688] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.977271][T20688] RSP: 002b:00007f900e760a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 302.985704][T20688] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 13:14:52 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) [ 302.993939][T20688] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 303.002119][T20688] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 303.010082][T20688] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 303.018050][T20688] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 [ 303.038137][T20688] ERROR: Out of memory at tomoyo_realpath_from_path. 13:14:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xe) 13:14:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x500) 13:14:52 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) 13:14:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x708) [ 303.191175][T20688] XFS (loop4): Invalid superblock magic number 13:14:53 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:53 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x10) 13:14:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x709) 13:14:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x300) 13:14:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x300) [ 303.576208][T20741] FAULT_INJECTION: forcing a failure. [ 303.576208][T20741] name failslab, interval 1, probability 0, space 0, times 0 [ 303.612549][T20741] CPU: 1 PID: 20741 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 13:14:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x11) [ 303.620576][T20741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.630637][T20741] Call Trace: [ 303.633949][T20741] dump_stack+0x1d8/0x2f8 [ 303.638290][T20741] should_fail+0x555/0x770 [ 303.642721][T20741] __should_failslab+0x11a/0x160 [ 303.647665][T20741] ? getname_flags+0xba/0x640 [ 303.652348][T20741] should_failslab+0x9/0x20 [ 303.656860][T20741] kmem_cache_alloc+0x56/0x2e0 [ 303.661643][T20741] ? check_preemption_disabled+0xb7/0x2a0 [ 303.667372][T20741] getname_flags+0xba/0x640 [ 303.671880][T20741] getname+0x19/0x20 13:14:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x300) [ 303.675789][T20741] do_sys_open+0x261/0x560 [ 303.680222][T20741] __x64_sys_open+0x87/0x90 [ 303.684738][T20741] do_syscall_64+0xfe/0x140 [ 303.689251][T20741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.695187][T20741] RIP: 0033:0x413711 [ 303.699190][T20741] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 13:14:53 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x300) [ 303.719091][T20741] RSP: 002b:00007f900e760a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 303.727517][T20741] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 303.735542][T20741] RDX: 00007f900e760b0a RSI: 0000000000000002 RDI: 00007f900e760b00 [ 303.743519][T20741] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 303.751497][T20741] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 303.759557][T20741] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:53 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x70a) 13:14:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x12) 13:14:53 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000fe80"}, 0x1c) 13:14:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x300) 13:14:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:53 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000fec0"}, 0x1c) 13:14:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x300) 13:14:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x70b) [ 304.112997][T20783] FAULT_INJECTION: forcing a failure. [ 304.112997][T20783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.126249][T20783] CPU: 0 PID: 20783 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 304.135959][T20783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.146014][T20783] Call Trace: [ 304.149311][T20783] dump_stack+0x1d8/0x2f8 [ 304.153636][T20783] should_fail+0x555/0x770 [ 304.158053][T20783] should_fail_alloc_page+0x55/0x60 [ 304.163256][T20783] prepare_alloc_pages+0x283/0x470 [ 304.168643][T20783] __alloc_pages_nodemask+0xb2/0x5d0 [ 304.173934][T20783] ? trace_lock_release+0x135/0x1a0 [ 304.179119][T20783] ? shmem_setattr+0x870/0x950 [ 304.183878][T20783] kmem_getpages+0x56/0xa20 [ 304.188473][T20783] ? trace_lock_release+0x135/0x1a0 [ 304.193676][T20783] cache_grow_begin+0x7e/0x2c0 [ 304.198435][T20783] cache_alloc_refill+0x311/0x3f0 [ 304.203648][T20783] ? check_preemption_disabled+0xb7/0x2a0 [ 304.209368][T20783] kmem_cache_alloc+0x2b9/0x2e0 [ 304.214213][T20783] ? getname_flags+0xba/0x640 [ 304.218881][T20783] getname_flags+0xba/0x640 [ 304.223491][T20783] getname+0x19/0x20 [ 304.227463][T20783] do_sys_open+0x261/0x560 [ 304.231869][T20783] __x64_sys_open+0x87/0x90 [ 304.236363][T20783] do_syscall_64+0xfe/0x140 [ 304.240859][T20783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.246749][T20783] RIP: 0033:0x413711 [ 304.250672][T20783] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 304.271743][T20783] RSP: 002b:00007f900e760a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 304.280145][T20783] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 304.288216][T20783] RDX: 00007f900e760b0a RSI: 0000000000000002 RDI: 00007f900e760b00 [ 304.296367][T20783] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 304.304327][T20783] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 13:14:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x25) [ 304.312302][T20783] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:53 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="0000000000000000000000000000e0ff"}, 0x1c) 13:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001540)=[{&(0x7f0000001000)=""/100, 0x64}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfee0, 0x0, 0x0, 0x800e0059e) shutdown(r1, 0x0) readv(r2, &(0x7f0000000280)=[{&(0x7f0000000000)=""/48, 0x30}, {0x0, 0x4f}], 0x100000000000007c) shutdown(r2, 0x0) [ 304.496995][T20783] XFS (loop4): Invalid superblock magic number 13:14:54 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x70c) 13:14:54 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x48) 13:14:54 executing program 1: poll(&(0x7f00000001c0)=[{}, {}], 0x2, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x4}, 0x10) r1 = dup2(r0, r0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffe, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) 13:14:54 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 304.900784][T20835] FAULT_INJECTION: forcing a failure. [ 304.900784][T20835] name failslab, interval 1, probability 0, space 0, times 0 [ 304.963011][T20835] CPU: 1 PID: 20835 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 304.971059][T20835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.981130][T20835] Call Trace: [ 304.984435][T20835] dump_stack+0x1d8/0x2f8 [ 304.988779][T20835] should_fail+0x555/0x770 [ 304.993224][T20835] __should_failslab+0x11a/0x160 [ 304.998187][T20835] ? __alloc_file+0x2c/0x390 [ 305.002797][T20835] should_failslab+0x9/0x20 [ 305.007397][T20835] kmem_cache_alloc+0x56/0x2e0 [ 305.012171][T20835] __alloc_file+0x2c/0x390 [ 305.016621][T20835] alloc_empty_file+0xac/0x1b0 [ 305.021399][T20835] path_openat+0x9e/0x4460 [ 305.025821][T20835] ? __kasan_kmalloc+0x178/0x1b0 [ 305.030915][T20835] ? __kasan_kmalloc+0x11c/0x1b0 [ 305.035860][T20835] ? kasan_slab_alloc+0xf/0x20 [ 305.040631][T20835] ? kmem_cache_alloc+0x1f5/0x2e0 [ 305.045655][T20835] ? getname+0x19/0x20 [ 305.049726][T20835] ? do_sys_open+0x261/0x560 [ 305.054328][T20835] ? do_syscall_64+0xfe/0x140 [ 305.059045][T20835] ? trace_mm_page_alloc+0x17a/0x1f0 [ 305.064345][T20835] ? cache_grow_end+0x143/0x170 [ 305.069216][T20835] ? trace_lock_release+0x135/0x1a0 [ 305.074420][T20835] ? cache_grow_end+0x143/0x170 [ 305.079278][T20835] ? trace_lock_release+0x135/0x1a0 [ 305.084479][T20835] ? __alloc_fd+0x58f/0x630 [ 305.089005][T20835] do_filp_open+0x192/0x3d0 [ 305.093518][T20835] ? _raw_spin_unlock+0x2c/0x50 [ 305.098385][T20835] do_sys_open+0x29f/0x560 [ 305.102812][T20835] __x64_sys_open+0x87/0x90 [ 305.107324][T20835] do_syscall_64+0xfe/0x140 [ 305.111837][T20835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.117747][T20835] RIP: 0033:0x413711 [ 305.121702][T20835] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 305.141307][T20835] RSP: 002b:00007f900e760a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 305.149712][T20835] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 13:14:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 13:14:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4c) 13:14:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x70d) 13:14:54 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 305.157681][T20835] RDX: 00007f900e760b0a RSI: 0000000000000002 RDI: 00007f900e760b00 [ 305.157687][T20835] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.157692][T20835] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 305.157698][T20835] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:54 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x68) 13:14:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x70e) 13:14:54 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 305.366633][T20869] FAULT_INJECTION: forcing a failure. [ 305.366633][T20869] name failslab, interval 1, probability 0, space 0, times 0 [ 305.410496][T20869] CPU: 1 PID: 20869 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 305.418531][T20869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.428602][T20869] Call Trace: [ 305.431938][T20869] dump_stack+0x1d8/0x2f8 [ 305.436291][T20869] should_fail+0x555/0x770 [ 305.440726][T20869] __should_failslab+0x11a/0x160 [ 305.445685][T20869] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 305.451584][T20869] should_failslab+0x9/0x20 [ 305.456096][T20869] __kmalloc+0x7a/0x340 [ 305.460529][T20869] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 305.466264][T20869] tomoyo_realpath_from_path+0xdc/0x7c0 [ 305.471816][T20869] tomoyo_check_open_permission+0x1ce/0x9d0 [ 305.477738][T20869] tomoyo_file_open+0x141/0x190 [ 305.482595][T20869] security_file_open+0x65/0x2f0 [ 305.487527][T20869] do_dentry_open+0x34e/0xf90 [ 305.492211][T20869] vfs_open+0x73/0x80 [ 305.496198][T20869] path_openat+0x1397/0x4460 [ 305.500790][T20869] ? getname+0x19/0x20 [ 305.504854][T20869] ? shmem_setattr+0x870/0x950 [ 305.509641][T20869] ? trace_lock_release+0x135/0x1a0 [ 305.514834][T20869] ? __alloc_fd+0x58f/0x630 [ 305.519336][T20869] do_filp_open+0x192/0x3d0 [ 305.523853][T20869] do_sys_open+0x29f/0x560 [ 305.528262][T20869] __x64_sys_open+0x87/0x90 [ 305.532759][T20869] do_syscall_64+0xfe/0x140 [ 305.537257][T20869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.543138][T20869] RIP: 0033:0x413711 [ 305.547021][T20869] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 305.566617][T20869] RSP: 002b:00007f900e760a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 305.575033][T20869] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 305.582997][T20869] RDX: 00007f900e760b0a RSI: 0000000000000002 RDI: 00007f900e760b00 [ 305.591414][T20869] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.599397][T20869] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 13:14:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x6c) 13:14:55 executing program 1: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4000000000038) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xf2}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 13:14:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x710) 13:14:55 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102005ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00') fcntl$notify(r0, 0x402, 0x80000013) getdents(r0, 0x0, 0xfffffffffffffe35) getdents(r0, &(0x7f0000000080)=""/92, 0x14b) [ 305.607361][T20869] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 [ 305.690387][T20869] ERROR: Out of memory at tomoyo_realpath_from_path. 13:14:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000000c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x360, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) 13:14:55 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x74) 13:14:55 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 305.855475][T20869] XFS (loop4): Invalid superblock magic number 13:14:55 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:14:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x711) 13:14:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x800000000000002, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x2, 0x0, 0x0) 13:14:55 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x7a) 13:14:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000080)) tkill(r1, 0x10010000000034) fcntl$setstatus(r0, 0x4, 0x80000000002c00) getrandom(0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x11) 13:14:55 executing program 3: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000300)={0x1, 0x0, 0x8}) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)={0x7fff, 0x7fff, 0x0, 0x0, 0x9, 0xf6f4}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) clone(0x1000000, &(0x7f0000000440)="917bfa0fcf5a3d82ceee09e56f530941fd5b14b290bc", &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)="90b654af") fchdir(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000340)={'bridge_slave_0\x00', {0x2, 0x4e21, @local}}) [ 306.174052][T20936] FAULT_INJECTION: forcing a failure. [ 306.174052][T20936] name failslab, interval 1, probability 0, space 0, times 0 [ 306.230447][T20936] CPU: 0 PID: 20936 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 306.238528][T20936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.248606][T20936] Call Trace: [ 306.251929][T20936] dump_stack+0x1d8/0x2f8 [ 306.256296][T20936] should_fail+0x555/0x770 [ 306.260741][T20936] __should_failslab+0x11a/0x160 [ 306.260756][T20936] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 306.260769][T20936] should_failslab+0x9/0x20 [ 306.260788][T20936] __kmalloc+0x7a/0x340 [ 306.282359][T20936] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 306.282371][T20936] tomoyo_realpath_from_path+0xdc/0x7c0 [ 306.282385][T20936] tomoyo_check_open_permission+0x1ce/0x9d0 [ 306.282409][T20936] tomoyo_file_open+0x141/0x190 [ 306.282420][T20936] security_file_open+0x65/0x2f0 [ 306.282439][T20936] do_dentry_open+0x34e/0xf90 [ 306.312251][T20936] vfs_open+0x73/0x80 [ 306.312263][T20936] path_openat+0x1397/0x4460 [ 306.312274][T20936] ? getname+0x19/0x20 [ 306.312290][T20936] ? cache_grow_end+0x143/0x170 [ 306.312307][T20936] ? trace_lock_release+0x135/0x1a0 [ 306.312325][T20936] ? __alloc_fd+0x58f/0x630 [ 306.326863][T20936] do_filp_open+0x192/0x3d0 [ 306.358517][T20936] do_sys_open+0x29f/0x560 [ 306.362947][T20936] __x64_sys_open+0x87/0x90 [ 306.367456][T20936] do_syscall_64+0xfe/0x140 [ 306.372926][T20936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.378881][T20936] RIP: 0033:0x413711 [ 306.382780][T20936] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 306.403201][T20936] RSP: 002b:00007f900e760a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 306.403213][T20936] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 306.403218][T20936] RDX: 00007f900e760b0a RSI: 0000000000000002 RDI: 00007f900e760b00 13:14:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x712) 13:14:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f) 13:14:55 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 306.403223][T20936] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 306.403227][T20936] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 306.403232][T20936] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 [ 306.425155][T20936] ERROR: Out of memory at tomoyo_realpath_from_path. 13:14:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 306.681771][T20936] XFS (loop4): Invalid superblock magic number 13:14:56 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:56 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x300) 13:14:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x725) 13:14:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:14:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:56 executing program 3: r0 = creat(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000140)={0x1, 0xfffffffffffffe6f, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x200000000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0xbefd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00m\x10\x1bDv\xe5j@\xca\x98\"X\xc7k\xb9u\x17w\xed*\xb23\xa9#\xcb\x12\x97\xe9U\x18\xd4\x8d\b\xfc\x845j\x18z\r\xd6\xea\xacE\xd3G\xa9Ki(\xf3\xa3\xfa\xf1\x11(b\am\xd21\x91Q\xbe}\xa3\x8b\r\xc2TR\xa9\tm\x1f\x12hf\xc6\xfa!\x8eK\xd9\x90K\xfa\xc1\x1d\xa9i\x17\a\xdb+\x95Z /\xc9\xafk\xb3!\x05\x17\xcb\x05\tX\x9c~\x85O\x97\x8f\xcc\xcc\xe4\xcb=\xdb\xdf\x1a\x81N\x01>\xdb7\xe3\xe3\xae;3\x8fF\x18\xa4Y `nu\xab!\x9dG\xea\x06\xa7\x83\t\x9b<\x10\xad\a\xb5Ia\xb4f\x97\xb7a4!\xe5h\xabk\x7f\xc4\x9d8\xdb>') ioctl$LOOP_SET_FD(r2, 0x4c00, r2) preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x4c000000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1000000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x100000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000003feec52a1af52916bbc00000000000000ffff0000000000009605000000000000000000000000000005070100000000000000000000000000000000000000000000000000000000000000000000000000020000000000000006000000000000000000000000000000ffff06020000000000000000000d00000000000000000000000000000000000000000000000000000000000000000000e6000000000000002b8600000000000068087f05000000000000000000000000000000000000000000000000000000000000000000000000682c3fbc12552e43e88d618c"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454cc6060507000700000000000000020000000d0000177b030000000000004000483d4e097bdce6f020acaf499ccc5881710010007301553a0004000000000000001600"], 0x45) recvmmsg(r3, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x210}, 0xc, &(0x7f0000000600)={0x0}}, 0x4002) r4 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000000)) [ 307.040774][T20996] FAULT_INJECTION: forcing a failure. [ 307.040774][T20996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.054028][T20996] CPU: 1 PID: 20996 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 307.062023][T20996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.072085][T20996] Call Trace: [ 307.075401][T20996] dump_stack+0x1d8/0x2f8 [ 307.079759][T20996] should_fail+0x555/0x770 [ 307.084240][T20996] should_fail_alloc_page+0x55/0x60 [ 307.089452][T20996] prepare_alloc_pages+0x283/0x470 [ 307.094574][T20996] __alloc_pages_nodemask+0xb2/0x5d0 [ 307.099879][T20996] kmem_getpages+0x56/0xa20 [ 307.104395][T20996] ? unwind_get_return_address+0x4c/0x90 [ 307.110075][T20996] cache_grow_begin+0x7e/0x2c0 [ 307.114859][T20996] cache_alloc_refill+0x311/0x3f0 [ 307.119917][T20996] ? check_preemption_disabled+0xb7/0x2a0 [ 307.125657][T20996] __kmalloc+0x318/0x340 [ 307.129923][T20996] ? tomoyo_realpath_from_path+0xdc/0x7c0 13:14:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) [ 307.135668][T20996] tomoyo_realpath_from_path+0xdc/0x7c0 [ 307.141600][T20996] tomoyo_check_open_permission+0x1ce/0x9d0 [ 307.147522][T20996] tomoyo_file_open+0x141/0x190 [ 307.152392][T20996] security_file_open+0x65/0x2f0 [ 307.157336][T20996] do_dentry_open+0x34e/0xf90 [ 307.162027][T20996] vfs_open+0x73/0x80 [ 307.166014][T20996] path_openat+0x1397/0x4460 [ 307.170614][T20996] ? getname+0x19/0x20 [ 307.174701][T20996] ? cache_grow_end+0x143/0x170 [ 307.179571][T20996] ? trace_lock_release+0x135/0x1a0 [ 307.184778][T20996] ? __alloc_fd+0x58f/0x630 [ 307.189302][T20996] do_filp_open+0x192/0x3d0 [ 307.193850][T20996] do_sys_open+0x29f/0x560 [ 307.198284][T20996] __x64_sys_open+0x87/0x90 [ 307.199752][T20985] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 307.202802][T20996] do_syscall_64+0xfe/0x140 [ 307.202817][T20996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.202825][T20996] RIP: 0033:0x413711 13:14:56 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x500) 13:14:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="00000000000000000000000000000010"}, 0x1c) [ 307.202835][T20996] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 307.202840][T20996] RSP: 002b:00007f900e760a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 307.202850][T20996] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 307.202856][T20996] RDX: 00007f900e760b0a RSI: 0000000000000002 RDI: 00007f900e760b00 [ 307.202861][T20996] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 13:14:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000fc"}, 0x1c) 13:14:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x748) [ 307.202866][T20996] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 307.202872][T20996] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:56 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x600) [ 307.383853][T20996] XFS (loop4): Invalid superblock magic number 13:14:57 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:14:57 executing program 3: open(0x0, 0x4000, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000002c0)=0xd, 0x4) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 13:14:57 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x74c) 13:14:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:14:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) [ 307.844021][T21056] FAULT_INJECTION: forcing a failure. [ 307.844021][T21056] name failslab, interval 1, probability 0, space 0, times 0 13:14:57 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x768) 13:14:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x900) [ 307.900421][T21056] CPU: 1 PID: 21056 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 [ 307.908722][T21056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.918805][T21056] Call Trace: [ 307.922105][T21056] dump_stack+0x1d8/0x2f8 [ 307.926451][T21056] should_fail+0x555/0x770 [ 307.930881][T21056] __should_failslab+0x11a/0x160 [ 307.935823][T21056] ? tomoyo_encode2+0x273/0x5a0 [ 307.940682][T21056] should_failslab+0x9/0x20 [ 307.945200][T21056] __kmalloc+0x7a/0x340 [ 307.949366][T21056] tomoyo_encode2+0x273/0x5a0 [ 307.954052][T21056] tomoyo_realpath_from_path+0x769/0x7c0 [ 307.959702][T21056] tomoyo_check_open_permission+0x1ce/0x9d0 [ 307.965622][T21056] tomoyo_file_open+0x141/0x190 [ 307.970488][T21056] security_file_open+0x65/0x2f0 [ 307.975439][T21056] do_dentry_open+0x34e/0xf90 [ 307.980147][T21056] vfs_open+0x73/0x80 [ 307.984243][T21056] path_openat+0x1397/0x4460 [ 307.988856][T21056] ? getname+0x19/0x20 [ 307.992944][T21056] ? cache_grow_end+0x143/0x170 [ 307.997855][T21056] ? trace_lock_release+0x135/0x1a0 [ 308.003204][T21056] ? __alloc_fd+0x58f/0x630 [ 308.007737][T21056] do_filp_open+0x192/0x3d0 [ 308.012289][T21056] do_sys_open+0x29f/0x560 [ 308.016725][T21056] __x64_sys_open+0x87/0x90 [ 308.021257][T21056] do_syscall_64+0xfe/0x140 [ 308.025786][T21056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.031700][T21056] RIP: 0033:0x413711 [ 308.035601][T21056] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 308.055224][T21056] RSP: 002b:00007f900e760a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 308.063651][T21056] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 308.071727][T21056] RDX: 00007f900e760b0a RSI: 0000000000000002 RDI: 00007f900e760b00 [ 308.079710][T21056] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 308.087706][T21056] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 308.095700][T21056] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 [ 308.105664][T21056] ERROR: Out of memory at tomoyo_realpath_from_path. 13:14:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:57 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) [ 308.274230][T21056] XFS (loop4): Invalid superblock magic number 13:14:58 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x76c) 13:14:58 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xa00) 13:14:58 executing program 3: poll(&(0x7f00000001c0)=[{}], 0x1, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) r1 = dup2(r0, r0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffe, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) 13:14:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) [ 308.669800][T21112] FAULT_INJECTION: forcing a failure. [ 308.669800][T21112] name failslab, interval 1, probability 0, space 0, times 0 [ 308.707381][T21112] CPU: 1 PID: 21112 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #68 13:14:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x774) [ 308.715406][T21112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.725460][T21112] Call Trace: [ 308.728758][T21112] dump_stack+0x1d8/0x2f8 [ 308.733101][T21112] should_fail+0x555/0x770 [ 308.737527][T21112] __should_failslab+0x11a/0x160 [ 308.742484][T21112] ? __kernfs_new_node+0x97/0x6b0 [ 308.747512][T21112] should_failslab+0x9/0x20 [ 308.752015][T21112] kmem_cache_alloc+0x56/0x2e0 [ 308.756771][T21112] __kernfs_new_node+0x97/0x6b0 [ 308.761689][T21112] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 308.767304][T21112] ? _raw_spin_unlock_irq+0x69/0x80 [ 308.772483][T21112] ? __schedule+0x998/0xc50 [ 308.776967][T21112] kernfs_new_node+0x97/0x180 [ 308.781634][T21112] kernfs_create_dir_ns+0x44/0x130 [ 308.786746][T21112] internal_create_group+0x207/0xd90 [ 308.792015][T21112] sysfs_create_group+0x1f/0x30 [ 308.796866][T21112] loop_set_fd+0xcb2/0x1180 [ 308.801352][T21112] lo_ioctl+0xd5/0x2200 [ 308.805489][T21112] ? __kasan_slab_free+0x12a/0x1e0 [ 308.810576][T21112] ? kasan_slab_free+0xe/0x10 [ 308.815230][T21112] ? kfree+0x115/0x200 [ 308.819288][T21112] ? tomoyo_path_number_perm+0x4e1/0x640 [ 308.824912][T21112] ? tomoyo_file_ioctl+0x23/0x30 [ 308.829825][T21112] ? security_file_ioctl+0x6d/0xd0 [ 308.834913][T21112] ? __x64_sys_ioctl+0xa3/0x120 [ 308.839739][T21112] ? do_syscall_64+0xfe/0x140 [ 308.844392][T21112] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.850439][T21112] ? debug_check_no_obj_freed+0x505/0x5b0 [ 308.856135][T21112] ? trace_lock_release+0x135/0x1a0 [ 308.861311][T21112] ? debug_check_no_obj_freed+0x505/0x5b0 [ 308.867013][T21112] ? rcu_lock_release+0x9/0x30 [ 308.871752][T21112] ? trace_lock_release+0x135/0x1a0 [ 308.876936][T21112] ? rcu_lock_release+0x9/0x30 [ 308.881680][T21112] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 308.887301][T21112] ? lo_release+0x1f0/0x1f0 [ 308.891797][T21112] blkdev_ioctl+0x807/0x2990 [ 308.896370][T21112] ? tomoyo_path_number_perm+0x53e/0x640 [ 308.901996][T21112] block_ioctl+0xbd/0x100 [ 308.906302][T21112] ? blkdev_iopoll+0x100/0x100 [ 308.911042][T21112] do_vfs_ioctl+0x744/0x1730 [ 308.915608][T21112] ? __fget+0x401/0x510 [ 308.919747][T21112] ? tomoyo_file_ioctl+0x23/0x30 [ 308.924694][T21112] ? security_file_ioctl+0xa1/0xd0 [ 308.929796][T21112] __x64_sys_ioctl+0xe3/0x120 [ 308.934454][T21112] do_syscall_64+0xfe/0x140 [ 308.938938][T21112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.944812][T21112] RIP: 0033:0x459697 [ 308.948699][T21112] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:14:58 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xb00) [ 308.968295][T21112] RSP: 002b:00007f900e760a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 308.976709][T21112] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 308.984658][T21112] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 308.992702][T21112] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 309.000652][T21112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 309.008601][T21112] R13: 00000000004c8aad R14: 00000000004df908 R15: 0000000000000003 13:14:58 executing program 3: 13:14:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:14:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 309.217473][T21112] XFS (loop4): Invalid superblock magic number 13:14:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:59 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x77a) 13:14:59 executing program 3: 13:14:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xc00) 13:14:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:14:59 executing program 3: 13:14:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xd00) 13:14:59 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 13:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:14:59 executing program 3: [ 309.829253][T21180] XFS (loop4): Invalid superblock magic number 13:14:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:14:59 executing program 3: 13:14:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:14:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xe00) 13:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:14:59 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xe10f) 13:14:59 executing program 3: 13:14:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:14:59 executing program 3: 13:14:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x1100) 13:14:59 executing program 3: 13:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:15:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='\\fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:00 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='environ\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x33d, 0x700) 13:15:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:15:00 executing program 3: [ 310.553353][T21247] FAT-fs (loop1): bogus number of reserved sectors [ 310.560000][T21247] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:00 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) socket(0x0, 0x8000f, 0x10000) 13:15:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x1200) 13:15:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 13:15:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:15:00 executing program 3: 13:15:00 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x410, 0x0, 0x0) r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@bcast, @netrom, @rose, @null, @rose, @remote, @bcast, @null]}, &(0x7f00000000c0)=0x48, 0x800) setsockopt$ax25_int(r0, 0x101, 0x7, &(0x7f0000000100)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x700) pipe2$9p(&(0x7f0000000000), 0x4000) 13:15:00 executing program 3: 13:15:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x%s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 310.900090][T21282] FAT-fs (loop1): bogus number of reserved sectors [ 310.929346][T21282] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x2500) 13:15:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 13:15:00 executing program 3: 13:15:00 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101801, 0x0) sendmsg$unix(r0, &(0x7f0000000800)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000180)="f0385a6601945ffd55f61417025bef6b0be4bbd26bac6ffa75ec4a9c6a32cd7c8881c9f1efd2ffc38fa33acf1890783bd3de006015ee9e274cf007a5b61416fce3edf9a8104acd4276e81e6c1a948c5aeec95d53e157819a4490197fc81adeb53e9e54f955dc1b3e452ebc609cd1fb91b10826f90644c385c122c150dd72a62d0a24e017b9c7bc595d992adefd25a18475a271adb1ee186c98cbd3402dcea61304bf33a3c052a7a6cdaefd7a583e666bc4d73ffadb85694368fecb785a91e8de86522e3beb88f5a12a9ac663666d275eb7c6bfcc649666231c4051f9fda6182459193374991fb6eb5b2784d92c8ce2de", 0xf0}, {&(0x7f00000000c0)="919ab41550db7d65dc862961948386d078da7a1c6dc18a0d6f0b8dbebccae71bde5ecf878f142af94a1a810500e82b753158be97301509117c48456016dd10dbfe", 0x41}, {&(0x7f0000000280)="5a75f4404491afc85bea495529f0c9593652f3bb68296edd1d9756baa4bb5315089520959a4aa74c702c8d3721f0c79022138124e8bc3554e66952c25d4f8381b92abff94706310cc638f16ff78731a71ba16e19caa29383883ee4b331360d9e82f732a832e3d8d05e7957cd1c0394c23d4b04fbcc5fb9f9e08faa2b40684f36f03f2aa40ec218fcfe8a172ba7c482eef26760eb015c2831c5d40803064246dfcb2f908aeabaa64293e6aaf267c131fd174ff2ea2a0a6ea9eed7bdfb58856d21d326f0a24c3f9935a74641fa9bb81bc1187dd76cecb6bc96e0", 0xd9}, {&(0x7f0000000380)="3b363899ad3d896d5f9f1b1a07524f9ce485865808bf0d0721386c978a42d14da4c455b42ae0a34ea4af9903d679f235d1620d6af78bdaa6f7cafafaebefba8ad65a386334454c189667f25fcd55f2bcbb391b506afeaa3798f639135755e760a2ce60c2050f5d1d8f1a8ab2dd683343b12f4e47105d648e12d77f6de0a4385185e52658f40ca814d0dfb8906675388dc47c034f156a159ec2c67033bf27d6abaf73852f06ce6583c3e63d6e377fe4a4811c848e7b1efb8a41df", 0xba}, {&(0x7f0000000440)="06b01032ec8707b01529b1c97402563beab520bdcefe9f3d65596e87105b2bb8365857a455d99d95e2233218f8b181aeae0a60bcaa2c13ee81236afa8ba605fa7f863cd521225f2a17484fc77d9e9b1c336f94a6c32bd9c44703ecd3cdc67ad1ce111c007aebaa7549110704c85091f1a47646e7c47a401052657c7a309278f7f7ba84cf86775d4575f1b72c202b8e7e71c032645177a525be53bc242326af29b570d11b8bc1aa6594f7f5521afb", 0xae}, {&(0x7f0000000500)="ca19b8606590d70f20da66d47aa18fed44313b9a08a8bc059da920c29fdb5829fa62424f3e5cabe7c7113e3ebcd527bc30dd4917910be53500b0e96a12e05f4d5ff89c7703a74288f34d40f93b24d88a4141f3059d3db83b18429172eb85e39f76a7986394a2a91e2ef4535df78b94209de756ca6c80966f0e8c5260e1b9a41003745b", 0x83}, {&(0x7f00000005c0)="e99adeef91d1f1921159da4ac80ce11c531926312d1387", 0x17}, {&(0x7f0000000600)="aa2d00570f14c78a0249abefaf646f2537", 0x11}, {&(0x7f0000000640)="a3f70854d2eea77a1059617cc178dd327703f968333b1172713f68aea0cecb55e54d6700f4b1bc146639bf39f1563deb4790da1de1dd6de8b60ccfd72cfb689deb24e3ae2bb35b403d2e0179515456a1e4c96a729c192dbfb1867cced16fdd0d148f717a5dc58affd7501a812315944804003497ac94731abc8acb12b3d0bd7ab272a2f8ff5d79319d892a1a79eb176468fc0a8f6d98a6227e6a3647ad01c6fc3909b7a0a68268caab188c0bcdf270424cae9a1cca2a1910dfcc291cf1fb8cbebb88ae5133fed30bed5d01cdad6263591a81ebac0ed052c293a0e17bbbb2e7e0681ee64f1da1d6cf402811f5fd", 0xed}], 0x9, 0x0, 0x0, 0x40}, 0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000840)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000008c0)='net/i\b\x00\x00\x00\x00\xe0]b\xc3Z\xfe\x03\xa5\xc9\x8f\xb9\xd0\r\xe6\x1d\x9aK4\xc3\x13\x95Q\xceBKZ\x13|z\xa0\xe1~P\xa2+\xf4 \xf7i\xd4\xcf\x8ak\xef=') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x33d, 0x700) 13:15:00 executing program 3: 13:15:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x.s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000fe"}, 0x1c) 13:15:00 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x12) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x68d, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x700) 13:15:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x3f00) [ 311.224085][T21314] FAT-fs (loop1): bogus number of reserved sectors [ 311.250985][T21314] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:00 executing program 3: 13:15:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000fe"}, 0x1c) 13:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x3, 0x0) 13:15:01 executing program 3: 13:15:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr="000000000000000000000000000000e0"}, 0x1c) 13:15:01 executing program 3: 13:15:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 13:15:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x/s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:01 executing program 3: 13:15:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x71, 0x0, 0xffffffffffffffdd}, 0x4}], 0x3fffffffffffc94, 0x102, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3f4, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040)={0x2a3, 0x1, 0x6, 0x0, 0x1}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x33d, 0x700) [ 311.686180][T21354] FAT-fs (loop1): bogus number of reserved sectors [ 311.717057][T21354] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x3, 0x0) 13:15:01 executing program 3: 13:15:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}, {0x0, 0x7530}}, 0x100) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:15:01 executing program 3: 13:15:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4800) 13:15:01 executing program 3: [ 312.035076][T21396] FAT-fs (loop1): bogus number of reserved sectors [ 312.088968][T21396] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x\\s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:01 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x700) 13:15:01 executing program 3: 13:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x3, 0x0) 13:15:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:01 executing program 3: 13:15:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4c00) 13:15:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0x1) 13:15:01 executing program 3: 13:15:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 312.424995][T21432] FAT-fs (loop1): bogus number of reserved sectors [ 312.457913][T21432] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:02 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:15:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x6800) 13:15:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf\n\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x3, 0x0) 13:15:02 executing program 3: 13:15:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 312.750629][T21470] FAT-fs (loop1): bogus number of reserved sectors 13:15:02 executing program 3: 13:15:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x6c00) [ 312.842416][T21470] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:02 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:15:02 executing program 3: 13:15:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x3, 0x0) 13:15:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf#\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 13:15:02 executing program 3: 13:15:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x7400) [ 313.200633][T21509] FAT-fs (loop1): bogus number of reserved sectors [ 313.224218][T21509] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:02 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000002a00)={{0x40, 0x85, 0xb7, 0x7, 0x6, 0xb37b}, 0xe0, 0x9, 0x100000001}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000002a40)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x1000, 0x1}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000004180)=""/4096) recvmmsg(r0, &(0x7f0000002980)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000000)=""/89, 0x59}, {&(0x7f0000000080)=""/92, 0x5c}, {&(0x7f0000001180)=""/101, 0x65}, {&(0x7f0000001200)=""/226, 0xe2}, {&(0x7f0000001300)=""/239, 0xef}], 0x6, &(0x7f0000001500)=""/162, 0xa2}, 0x1}, {{&(0x7f00000015c0)=@alg, 0x80, &(0x7f0000002880)=[{&(0x7f0000001640)=""/114, 0x72}, {&(0x7f00000016c0)=""/254, 0xfe}, {&(0x7f00000017c0)=""/157, 0x9d}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000003180)=""/4096, 0x1000}], 0x5, &(0x7f0000002900)=""/82, 0x52}, 0x2}], 0x2, 0x2, &(0x7f0000000100)={0x77359400}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000002a80)=""/205) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 13:15:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x3, 0x0) 13:15:02 executing program 3: 13:15:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0x10}, 0x1c) 13:15:03 executing program 3: 13:15:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xfc}, 0x1c) 13:15:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf%\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x7a00) 13:15:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:15:03 executing program 3: [ 313.633058][T21546] FAT-fs (loop1): bogus number of reserved sectors [ 313.661824][T21546] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0x3f00}, 0x1c) 13:15:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x3, 0x0) 13:15:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x2000000005, @in6={0xa, 0x0, 0x0, @mcast2}}}, 0xa0) prctl$PR_GET_KEEPCAPS(0x7) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:15:03 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f00000004c0)='./file1\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, 0x0) r1 = getuid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x2, r0}, {0x2, 0x7, r1}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:15:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x8f00) [ 313.887001][T21583] FAT-fs (loop1): bogus number of reserved sectors [ 313.920855][T21583] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf*\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0x4000}, 0x1c) 13:15:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xfc00}, 0x1c) 13:15:03 executing program 2: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xb41) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x20, 0x4, 0x7, 0x4080, 0x6}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') r2 = request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='net/ip_vs\x00', 0xfffffffffffffff8) r3 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='trusted}\xf6\x00', 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="aa6c709454d0de54b30369339d048ec33ef90efbf06f8ab013a40eed73eb369295eb33db6afd2ac88a1c", 0x2a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r3, r4}, &(0x7f0000000340)=""/60, 0x3c, &(0x7f00000003c0)={&(0x7f0000000380)={'tgr160\x00'}}) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x42d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x221}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000000), 0x1000016f, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000000)) 13:15:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x100000) [ 314.059849][T21604] overlayfs: lowerdir is in-use as upperdir/workdir [ 314.075364][T21594] overlayfs: workdir and upperdir must reside under the same mount 13:15:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) ioctl(0xffffffffffffffff, 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2000000000003, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futimesat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=tcp,p', @ANYRESHEX, @ANYBLOB=',nodevmap,posixacl,version=9p2000,fscache,']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:15:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x3, 0x0) 13:15:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xff00}, 0x1c) 13:15:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xc7, "77fcae46e151f08857208e3b85bd3b76c1745d363bee77bb05b68605fb677b78444748abfaeb8428f866ca3d7821cad35aca5c23f9134b65e2e9965d5fee3ce4f0af8ec7639ad0517b7c4bdb731922e00085b4ca67e11e1a3d593734dc659a3e57c9296d5114a7e93b69b279a9647c51c215249a257062885bc289140aab57cb670eb032703076557e09217240d3f7d7fdf9ebad4a481f6f9d8300d99d31dfd2c5b020470af294912196ef43c67e7102e1384f9f64b6f33d61b9fb96d203ddad40f39011b6a334"}, &(0x7f0000000100)=0xcf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x6}, 0x8) 13:15:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xf0ff7f) 13:15:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0x100000}, 0x1c) [ 314.333188][T21628] FAT-fs (loop1): bogus number of reserved sectors [ 314.361216][T21628] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf+\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) [ 314.426441][T21639] 9pnet: p9_fd_create_tcp (21639): problem connecting socket to 127.0.0.1 [ 314.497726][T21646] 9pnet: p9_fd_create_tcp (21646): problem connecting socket to 127.0.0.1 13:15:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x3, 0x0) 13:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) ioctl(0xffffffffffffffff, 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2000000000003, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futimesat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=tcp,p', @ANYRESHEX, @ANYBLOB=',nodevmap,posixacl,version=9p2000,fscache,']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:15:04 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0x1000000}, 0x1c) 13:15:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x1000000) 13:15:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x40e1112, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x700) [ 314.702810][T21669] FAT-fs (loop1): bogus number of reserved sectors [ 314.734272][T21669] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:04 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0x3f000000}, 0x1c) 13:15:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf-\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) ioctl(0xffffffffffffffff, 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2000000000003, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futimesat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=tcp,p', @ANYRESHEX, @ANYBLOB=',nodevmap,posixacl,version=9p2000,fscache,']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 314.837511][T21683] 9pnet: p9_fd_create_tcp (21683): problem connecting socket to 127.0.0.1 13:15:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='let/ip_\x05s\x00\xa0!\x1e\xd8\xf3\xf0q4\xb5\xc0\xb5\x83\x02\x00\x00\x00\x00\x00\x00\x00v\xba\x13\xd4B\x8a\x83F\x02\xa9F\x00\xfa\xe6-\xcb+\xc7\xebx8') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0xfffffffffffffffe, 0x8000, 0x7, 0x4, 0x20, 0x9}) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7, 0x6d, 0x1}, 0x7) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0xb8d, 0x9, 0x1, 0x7, 0x0, 0x8, 0x0, 0x1, 0x9, 0x4, 0x8000000000, 0x7ff, 0x3d817c2b, 0xffffffffffffffe1, 0x3, 0x2, 0xb0b, 0x3, 0x3, 0x9, 0x7, 0x9, 0x7, 0x8, 0x7, 0x7, 0x0, 0x6, 0x6, 0x8c89, 0x0, 0x5, 0x8, 0x1, 0x20, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x8, 0x40}, 0x30020, 0xfffffffffffffffd, 0x1ecf, 0x9, 0x9, 0x0, 0x7fffffff}, 0x0, 0x8, r1, 0x2) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 13:15:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x2000000) 13:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) ioctl(0xffffffffffffffff, 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2000000000003, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futimesat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=tcp,p', @ANYRESHEX, @ANYBLOB=',nodevmap,posixacl,version=9p2000,fscache,']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:15:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)}], 0x3, 0x0) 13:15:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}, 0x400}], 0x40000000000003a, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x80000) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/ip_vs\x00') ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000440)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000400)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000380)=[{&(0x7f0000000040)=""/248, 0xf8}, {&(0x7f0000000180)=""/247, 0xf7}, {&(0x7f0000000280)=""/58, 0x3a}, {&(0x7f00000002c0)=""/63, 0x1ae0552dd6a1cfaa}, {&(0x7f0000000300)=""/104, 0x68}], 0x100000000000011c, 0x0) 13:15:04 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0x40000000}, 0x1c) 13:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) ioctl(0xffffffffffffffff, 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2000000000003, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futimesat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=tcp,p', @ANYRESHEX, @ANYBLOB=',nodevmap,posixacl,version=9p2000,fscache,']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:15:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x3000000) [ 315.223927][T21723] FAT-fs (loop1): bogus number of reserved sectors 13:15:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x700) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:15:04 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xe0ffffff}, 0x1c) [ 315.273763][T21723] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf.\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)}], 0x3, 0x0) 13:15:05 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xfc000000}, 0x1c) 13:15:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) [ 315.545869][T21759] FAT-fs (loop1): bogus number of reserved sectors [ 315.567762][T21741] 9pnet: p9_fd_create_tcp (21741): problem connecting socket to 127.0.0.1 13:15:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000000) 13:15:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) ioctl(0xffffffffffffffff, 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2000000000003, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futimesat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=tcp,p', @ANYRESHEX, @ANYBLOB=',nodevmap,posixacl,version=9p2000,fscache,']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:15:05 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xfe80ffff}, 0x1c) [ 315.600395][T21759] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:05 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xfec0ffff}, 0x1c) 13:15:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf/\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@filestreams='filestreams'}, {@prjquota='prjquota'}]}) 13:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)}], 0x3, 0x0) 13:15:05 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001680)={0x53, 0x0, 0x200000c6, 0x0, @buffer={0x10e, 0xb8, &(0x7f00000001c0)=""/184}, &(0x7f00000000c0)="0008e4ffd2d4", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 315.855961][T21783] 9pnet: p9_fd_create_tcp (21783): problem connecting socket to 127.0.0.1 13:15:05 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069d3623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800300100000000000000000000000000000013000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000008000ff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000000000000000000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f23d16db95d8c0e55c1143ee475b9d3164736495edcb2da215eb00000000000000ac29f305dfc2"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xff000000}, 0x1c) 13:15:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xffffffffffffffdd, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x5000000) [ 315.938175][T21795] FAT-fs (loop1): bogus number of reserved sectors [ 315.985288][T21795] FAT-fs (loop1): Can't find a valid FAT filesystem 13:15:05 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr, 0xffff0000}, 0x1c) 13:15:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000001300)=ANY=[], 0x0, 0x0) [ 316.225905][T10180] WARNING: CPU: 0 PID: 10180 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 316.234979][T10180] Kernel panic - not syncing: panic_on_warn set ... [ 316.241621][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 316.249338][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.259414][T10180] Workqueue: events bpf_prog_free_deferred [ 316.267748][T10180] Call Trace: [ 316.271052][T10180] dump_stack+0x1d8/0x2f8 [ 316.275428][T10180] panic+0x25c/0x799 [ 316.279347][T10180] ? __warn+0x126/0x230 [ 316.283546][T10180] __warn+0x22f/0x230 [ 316.287542][T10180] ? bpf_jit_free+0x1a8/0x1f0 [ 316.292237][T10180] report_bug+0x190/0x290 [ 316.296621][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 316.304348][T10180] #PF: supervisor read access in kernel mode [ 316.310373][T10180] #PF: error_code(0x0000) - not-present page [ 316.316355][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 316.323938][T10180] Oops: 0000 [#1] PREEMPT SMP KASAN [ 316.329136][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 316.336859][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.346930][T10180] Workqueue: events bpf_prog_free_deferred [ 316.352761][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 316.358732][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 316.379972][T10180] RSP: 0018:ffff8880660b7828 EFLAGS: 00010806 [ 316.386050][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 316.394037][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 316.402012][T10180] RBP: ffff8880660b7860 R08: ffffffff817dc75b R09: 0000000000000001 [ 316.409985][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 316.417963][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 316.425945][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 316.434895][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 316.441483][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 316.449541][T10180] Call Trace: [ 316.452853][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 316.460584][T10180] #PF: supervisor read access in kernel mode [ 316.466584][T10180] #PF: error_code(0x0000) - not-present page [ 316.472555][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 316.480105][T10180] Oops: 0000 [#2] PREEMPT SMP KASAN [ 316.485390][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 316.493091][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.503145][T10180] Workqueue: events bpf_prog_free_deferred [ 316.508946][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 316.514824][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 316.534435][T10180] RSP: 0018:ffff8880660b7450 EFLAGS: 00010806 [ 316.540519][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 316.548476][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 316.556525][T10180] RBP: ffff8880660b7488 R08: ffffffff817dc75b R09: 0000000000000001 [ 316.564495][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 316.572458][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 316.580420][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 316.589335][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 316.595997][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 316.603965][T10180] Call Trace: [ 316.607263][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 316.614963][T10180] #PF: supervisor read access in kernel mode [ 316.620925][T10180] #PF: error_code(0x0000) - not-present page [ 316.626908][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 316.634448][T10180] Oops: 0000 [#3] PREEMPT SMP KASAN [ 316.639802][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 316.647511][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.657583][T10180] Workqueue: events bpf_prog_free_deferred [ 316.663382][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 316.669258][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 316.688856][T10180] RSP: 0018:ffff8880660b7080 EFLAGS: 00010806 [ 316.694914][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 316.702875][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 316.710832][T10180] RBP: ffff8880660b70b8 R08: ffffffff817dc75b R09: 0000000000000001 [ 316.718791][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 316.726844][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 316.734807][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 316.743731][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 316.750304][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 316.758263][T10180] Call Trace: [ 316.761561][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 316.769256][T10180] #PF: supervisor read access in kernel mode [ 316.775225][T10180] #PF: error_code(0x0000) - not-present page [ 316.781222][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 316.788761][T10180] Oops: 0000 [#4] PREEMPT SMP KASAN [ 316.793950][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 316.801643][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.811690][T10180] Workqueue: events bpf_prog_free_deferred [ 316.817500][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 316.823463][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 316.843088][T10180] RSP: 0018:ffff8880660b6cb0 EFLAGS: 00010806 [ 316.849142][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 316.857100][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 316.865189][T10180] RBP: ffff8880660b6ce8 R08: ffffffff817dc75b R09: 0000000000000001 [ 316.873148][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 316.881109][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 316.889069][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 316.897984][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 316.904550][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 316.912603][T10180] Call Trace: [ 316.915906][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 316.923612][T10180] #PF: supervisor read access in kernel mode [ 316.929591][T10180] #PF: error_code(0x0000) - not-present page [ 316.935551][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 316.943288][T10180] Oops: 0000 [#5] PREEMPT SMP KASAN [ 316.948478][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 316.956275][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.966610][T10180] Workqueue: events bpf_prog_free_deferred [ 316.972416][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 316.978392][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 316.997989][T10180] RSP: 0018:ffff8880660b68e0 EFLAGS: 00010806 [ 317.004046][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 317.012026][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 317.019986][T10180] RBP: ffff8880660b6918 R08: ffffffff817dc75b R09: 0000000000000001 [ 317.027951][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 317.035925][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 317.043894][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 317.052811][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.059386][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 317.067348][T10180] Call Trace: [ 317.070646][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 317.078384][T10180] #PF: supervisor read access in kernel mode [ 317.084350][T10180] #PF: error_code(0x0000) - not-present page [ 317.090315][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 317.097857][T10180] Oops: 0000 [#6] PREEMPT SMP KASAN [ 317.103046][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 317.110746][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.120812][T10180] Workqueue: events bpf_prog_free_deferred [ 317.126614][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 317.132499][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 317.152632][T10180] RSP: 0018:ffff8880660b6510 EFLAGS: 00010806 [ 317.158689][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 317.166657][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 317.174620][T10180] RBP: ffff8880660b6548 R08: ffffffff817dc75b R09: 0000000000000001 [ 317.182580][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 317.190566][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 317.198529][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 317.207443][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.214014][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 317.221968][T10180] Call Trace: [ 317.225262][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 317.232967][T10180] #PF: supervisor read access in kernel mode [ 317.238931][T10180] #PF: error_code(0x0000) - not-present page [ 317.244890][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 317.252429][T10180] Oops: 0000 [#7] PREEMPT SMP KASAN [ 317.257609][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 317.265779][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.275836][T10180] Workqueue: events bpf_prog_free_deferred [ 317.281648][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 317.287528][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 317.307128][T10180] RSP: 0018:ffff8880660b6140 EFLAGS: 00010806 [ 317.313187][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 317.321143][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 317.329102][T10180] RBP: ffff8880660b6178 R08: ffffffff817dc75b R09: 0000000000000001 [ 317.337143][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 317.345099][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 317.353073][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 317.361993][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.368699][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 317.376846][T10180] Call Trace: [ 317.380144][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 317.387867][T10180] #PF: supervisor read access in kernel mode [ 317.393838][T10180] #PF: error_code(0x0000) - not-present page [ 317.399799][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 317.407334][T10180] Oops: 0000 [#8] PREEMPT SMP KASAN [ 317.412520][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 317.420217][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.430276][T10180] Workqueue: events bpf_prog_free_deferred [ 317.436085][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 317.441959][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 317.461552][T10180] RSP: 0018:ffff8880660b5d70 EFLAGS: 00010806 [ 317.467602][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 317.475570][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 317.483528][T10180] RBP: ffff8880660b5da8 R08: ffffffff817dc75b R09: 0000000000000001 [ 317.491485][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 317.499459][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 317.507423][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 317.516340][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.522905][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 317.530862][T10180] Call Trace: [ 317.534154][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 317.541850][T10180] #PF: supervisor read access in kernel mode [ 317.547815][T10180] #PF: error_code(0x0000) - not-present page [ 317.553784][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 317.561345][T10180] Oops: 0000 [#9] PREEMPT SMP KASAN [ 317.566532][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 317.574235][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.584309][T10180] Workqueue: events bpf_prog_free_deferred [ 317.590124][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 317.596026][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 317.615641][T10180] RSP: 0018:ffff8880660b59a0 EFLAGS: 00010806 [ 317.621702][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 317.629671][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 317.637635][T10180] RBP: ffff8880660b59d8 R08: ffffffff817dc75b R09: 0000000000000001 [ 317.645596][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 317.653561][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 317.661541][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 317.670464][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.677034][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 317.685008][T10180] Call Trace: [ 317.688299][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 317.695997][T10180] #PF: supervisor read access in kernel mode [ 317.701956][T10180] #PF: error_code(0x0000) - not-present page [ 317.707924][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 317.715458][T10180] Oops: 0000 [#10] PREEMPT SMP KASAN [ 317.720727][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 317.728425][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.738479][T10180] Workqueue: events bpf_prog_free_deferred [ 317.744287][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 317.750162][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 317.769773][T10180] RSP: 0018:ffff8880660b55d0 EFLAGS: 00010806 [ 317.776178][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 317.784136][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 317.792094][T10180] RBP: ffff8880660b5608 R08: ffffffff817dc75b R09: 0000000000000001 [ 317.800503][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 317.808461][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 317.816419][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 317.825358][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.831934][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 317.839890][T10180] Call Trace: [ 317.843184][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 317.850884][T10180] #PF: supervisor read access in kernel mode [ 317.856841][T10180] #PF: error_code(0x0000) - not-present page [ 317.862802][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 317.870514][T10180] Oops: 0000 [#11] PREEMPT SMP KASAN [ 317.881167][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 317.888863][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.898933][T10180] Workqueue: events bpf_prog_free_deferred [ 317.904743][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 317.910623][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 317.930216][T10180] RSP: 0018:ffff8880660b5200 EFLAGS: 00010806 [ 317.936278][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 317.944236][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 317.952219][T10180] RBP: ffff8880660b5238 R08: ffffffff817dc75b R09: 0000000000000001 [ 317.960284][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 317.968244][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 317.976219][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 317.985137][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.991801][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 317.999761][T10180] Call Trace: [ 318.003233][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 318.011023][T10180] #PF: supervisor read access in kernel mode [ 318.017004][T10180] #PF: error_code(0x0000) - not-present page [ 318.022974][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 318.030524][T10180] Oops: 0000 [#12] PREEMPT SMP KASAN [ 318.035801][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 318.043507][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.053594][T10180] Workqueue: events bpf_prog_free_deferred [ 318.059409][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 318.065487][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 318.085263][T10180] RSP: 0018:ffff8880660b4e30 EFLAGS: 00010806 [ 318.091331][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 318.099303][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 318.107280][T10180] RBP: ffff8880660b4e68 R08: ffffffff817dc75b R09: 0000000000000001 [ 318.115252][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 318.123229][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 318.131222][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 318.140166][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.146770][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 318.154752][T10180] Call Trace: [ 318.158154][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 318.165861][T10180] #PF: supervisor read access in kernel mode [ 318.171831][T10180] #PF: error_code(0x0000) - not-present page [ 318.177801][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 318.185357][T10180] Oops: 0000 [#13] PREEMPT SMP KASAN [ 318.190649][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 318.198356][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.208526][T10180] Workqueue: events bpf_prog_free_deferred [ 318.214344][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 318.220350][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 318.239968][T10180] RSP: 0018:ffff8880660b4a60 EFLAGS: 00010806 [ 318.246034][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 318.254029][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 318.262006][T10180] RBP: ffff8880660b4a98 R08: ffffffff817dc75b R09: 0000000000000001 [ 318.271535][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 318.279516][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 318.287584][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 318.296536][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.303118][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 318.311120][T10180] Call Trace: [ 318.314449][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 318.322189][T10180] #PF: supervisor read access in kernel mode [ 318.328163][T10180] #PF: error_code(0x0000) - not-present page [ 318.334165][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 318.341834][T10180] Oops: 0000 [#14] PREEMPT SMP KASAN [ 318.347144][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 318.355227][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.365322][T10180] Workqueue: events bpf_prog_free_deferred [ 318.373050][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 318.378953][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 318.398570][T10180] RSP: 0018:ffff8880660b4690 EFLAGS: 00010806 [ 318.404665][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 318.412639][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 318.420619][T10180] RBP: ffff8880660b46c8 R08: ffffffff817dc75b R09: 0000000000000001 [ 318.428616][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 318.436599][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 318.444577][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 318.453504][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.460512][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 318.468480][T10180] Call Trace: [ 318.471903][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 318.479607][T10180] #PF: supervisor read access in kernel mode [ 318.485578][T10180] #PF: error_code(0x0000) - not-present page [ 318.491636][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 318.499202][T10180] Oops: 0000 [#15] PREEMPT SMP KASAN [ 318.504501][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 318.512230][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.522297][T10180] Workqueue: events bpf_prog_free_deferred [ 318.528132][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 318.534048][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 318.553652][T10180] RSP: 0018:ffff8880660b42c0 EFLAGS: 00010806 [ 318.559722][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 318.567713][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 318.575709][T10180] RBP: ffff8880660b42f8 R08: ffffffff817dc75b R09: 0000000000000001 [ 318.583699][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 318.591671][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 318.599702][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 318.608633][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.615216][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 318.623199][T10180] Call Trace: [ 318.626823][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 318.634542][T10180] #PF: supervisor read access in kernel mode [ 318.640527][T10180] #PF: error_code(0x0000) - not-present page [ 318.646504][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 318.654063][T10180] Oops: 0000 [#16] PREEMPT SMP KASAN [ 318.659340][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 318.667057][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.677121][T10180] Workqueue: events bpf_prog_free_deferred [ 318.683049][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 318.688932][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 318.708723][T10180] RSP: 0018:ffff8880660b3ef0 EFLAGS: 00010806 [ 318.716035][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 318.724095][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 318.732154][T10180] RBP: ffff8880660b3f28 R08: ffffffff817dc75b R09: 0000000000000001 [ 318.740140][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 318.748166][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 318.756233][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 318.765361][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.772034][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 318.780197][T10180] Call Trace: [ 318.784298][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 318.792527][T10180] #PF: supervisor read access in kernel mode [ 318.798585][T10180] #PF: error_code(0x0000) - not-present page [ 318.804571][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 318.812309][T10180] Oops: 0000 [#17] PREEMPT SMP KASAN [ 318.817871][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 318.825931][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.836004][T10180] Workqueue: events bpf_prog_free_deferred [ 318.841837][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 318.847735][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 318.867553][T10180] RSP: 0018:ffff8880660b3b20 EFLAGS: 00010806 [ 318.873630][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 318.881600][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 318.889576][T10180] RBP: ffff8880660b3b58 R08: ffffffff817dc75b R09: 0000000000000001 [ 318.897639][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 318.905624][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 318.913627][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 318.922663][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.930059][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 318.938049][T10180] Call Trace: [ 318.941364][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 318.949161][T10180] #PF: supervisor read access in kernel mode [ 318.955245][T10180] #PF: error_code(0x0000) - not-present page [ 318.961261][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 318.969454][T10180] Oops: 0000 [#18] PREEMPT SMP KASAN [ 318.974830][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 318.982582][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.992654][T10180] Workqueue: events bpf_prog_free_deferred [ 318.998521][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 319.004723][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 319.024527][T10180] RSP: 0018:ffff8880660b3750 EFLAGS: 00010806 [ 319.030687][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 319.038670][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 319.046670][T10180] RBP: ffff8880660b3788 R08: ffffffff817dc75b R09: 0000000000000001 [ 319.054653][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 319.062723][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 319.070892][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 319.079913][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.086510][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 319.094505][T10180] Call Trace: [ 319.097827][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 319.105563][T10180] #PF: supervisor read access in kernel mode [ 319.111572][T10180] #PF: error_code(0x0000) - not-present page [ 319.117553][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 319.125218][T10180] Oops: 0000 [#19] PREEMPT SMP KASAN [ 319.130770][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 319.138577][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.148685][T10180] Workqueue: events bpf_prog_free_deferred [ 319.154566][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 319.160556][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 319.180372][T10180] RSP: 0018:ffff8880660b3380 EFLAGS: 00010806 [ 319.186478][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 319.194600][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 319.203312][T10180] RBP: ffff8880660b33b8 R08: ffffffff817dc75b R09: 0000000000000001 [ 319.211651][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 319.220431][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 319.228617][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 319.238096][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.244722][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 319.252908][T10180] Call Trace: [ 319.256337][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 319.264073][T10180] #PF: supervisor read access in kernel mode [ 319.270059][T10180] #PF: error_code(0x0000) - not-present page [ 319.276044][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 319.283796][T10180] Oops: 0000 [#20] PREEMPT SMP KASAN [ 319.289101][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 319.296848][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.307368][T10180] Workqueue: events bpf_prog_free_deferred [ 319.313381][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 319.319467][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 319.341606][T10180] RSP: 0018:ffff8880660b2fb0 EFLAGS: 00010806 [ 319.348042][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 319.362031][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 319.370276][T10180] RBP: ffff8880660b2fe8 R08: ffffffff817dc75b R09: 0000000000000001 [ 319.378430][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 319.386403][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 319.395250][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 319.404298][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.410893][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 319.418998][T10180] Call Trace: [ 319.422347][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 319.430441][T10180] #PF: supervisor read access in kernel mode [ 319.436588][T10180] #PF: error_code(0x0000) - not-present page [ 319.442575][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 319.450149][T10180] Oops: 0000 [#21] PREEMPT SMP KASAN [ 319.455904][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 319.464158][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.475312][T10180] Workqueue: events bpf_prog_free_deferred [ 319.481170][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 319.487164][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 319.507958][T10180] RSP: 0018:ffff8880660b2be0 EFLAGS: 00010806 [ 319.514249][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 319.522959][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 319.530954][T10180] RBP: ffff8880660b2c18 R08: ffffffff817dc75b R09: 0000000000000001 [ 319.538969][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 319.546974][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 319.554962][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 319.563910][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.570502][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 319.578915][T10180] Call Trace: [ 319.582552][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 319.590792][T10180] #PF: supervisor read access in kernel mode [ 319.596792][T10180] #PF: error_code(0x0000) - not-present page [ 319.602784][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 319.610344][T10180] Oops: 0000 [#22] PREEMPT SMP KASAN [ 319.615633][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 319.623342][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.633601][T10180] Workqueue: events bpf_prog_free_deferred [ 319.639512][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 319.645439][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 319.666027][T10180] RSP: 0018:ffff8880660b2810 EFLAGS: 00010806 [ 319.672276][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 319.680334][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 319.688304][T10180] RBP: ffff8880660b2848 R08: ffffffff817dc75b R09: 0000000000000001 [ 319.698719][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 319.707651][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 319.717621][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 319.731172][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.737853][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 319.745825][T10180] Call Trace: [ 319.749141][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 319.757135][T10180] #PF: supervisor read access in kernel mode [ 319.763126][T10180] #PF: error_code(0x0000) - not-present page [ 319.770149][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 319.778274][T10180] Oops: 0000 [#23] PREEMPT SMP KASAN [ 319.783657][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 319.791539][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.801718][T10180] Workqueue: events bpf_prog_free_deferred [ 319.807538][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 319.813601][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 319.834809][T10180] RSP: 0018:ffff8880660b2440 EFLAGS: 00010806 [ 319.842202][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 319.850667][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 319.859189][T10180] RBP: ffff8880660b2478 R08: ffffffff817dc75b R09: 0000000000000001 [ 319.869005][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 319.879515][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 319.887857][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 319.896797][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.903418][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 319.911392][T10180] Call Trace: [ 319.914800][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 319.922719][T10180] #PF: supervisor read access in kernel mode [ 319.928717][T10180] #PF: error_code(0x0000) - not-present page [ 319.935174][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 319.943899][T10180] Oops: 0000 [#24] PREEMPT SMP KASAN [ 319.949722][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 319.957457][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.967536][T10180] Workqueue: events bpf_prog_free_deferred [ 319.973338][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 319.979229][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 319.999614][T10180] RSP: 0018:ffff8880660b2070 EFLAGS: 00010806 [ 320.005674][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 320.013986][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 320.022129][T10180] RBP: ffff8880660b20a8 R08: ffffffff817dc75b R09: 0000000000000001 [ 320.030188][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 320.038186][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 320.046177][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 320.055286][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.061875][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 320.069849][T10180] Call Trace: [ 320.073163][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 320.080879][T10180] #PF: supervisor read access in kernel mode [ 320.087489][T10180] #PF: error_code(0x0000) - not-present page [ 320.093504][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 320.101147][T10180] Oops: 0000 [#25] PREEMPT SMP KASAN [ 320.106574][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 320.114650][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.124807][T10180] Workqueue: events bpf_prog_free_deferred [ 320.130743][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 320.137192][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 320.157419][T10180] RSP: 0018:ffff8880660b1ca0 EFLAGS: 00010806 [ 320.164375][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 320.173694][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 320.181914][T10180] RBP: ffff8880660b1cd8 R08: ffffffff817dc75b R09: 0000000000000001 [ 320.190443][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 320.198713][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 320.206797][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 320.217040][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.223759][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 320.231835][T10180] Call Trace: [ 320.235142][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 320.242869][T10180] #PF: supervisor read access in kernel mode [ 320.248849][T10180] #PF: error_code(0x0000) - not-present page [ 320.255003][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 320.264214][T10180] Oops: 0000 [#26] PREEMPT SMP KASAN [ 320.270029][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 320.277913][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.287994][T10180] Workqueue: events bpf_prog_free_deferred [ 320.293802][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 320.299694][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 320.319310][T10180] RSP: 0018:ffff8880660b18d0 EFLAGS: 00010806 [ 320.325377][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 320.333347][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 320.341751][T10180] RBP: ffff8880660b1908 R08: ffffffff817dc75b R09: 0000000000000001 [ 320.349727][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 320.357885][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 320.365886][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 320.376557][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.383319][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 320.391325][T10180] Call Trace: [ 320.394641][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 320.402861][T10180] #PF: supervisor read access in kernel mode [ 320.408880][T10180] #PF: error_code(0x0000) - not-present page [ 320.415301][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 320.432784][T10180] Oops: 0000 [#27] PREEMPT SMP KASAN [ 320.438461][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 320.446446][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.456554][T10180] Workqueue: events bpf_prog_free_deferred [ 320.462482][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 320.468518][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 320.488673][T10180] RSP: 0018:ffff8880660b1500 EFLAGS: 00010806 [ 320.494779][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 320.503412][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 320.511861][T10180] RBP: ffff8880660b1538 R08: ffffffff817dc75b R09: 0000000000000001 [ 320.520101][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 320.529159][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 320.539153][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 320.549503][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.556762][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 320.564756][T10180] Call Trace: [ 320.568109][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 320.575933][T10180] #PF: supervisor read access in kernel mode [ 320.582064][T10180] #PF: error_code(0x0000) - not-present page [ 320.588654][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 320.597883][T10180] Oops: 0000 [#28] PREEMPT SMP KASAN [ 320.603184][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 320.610905][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.622136][T10180] Workqueue: events bpf_prog_free_deferred [ 320.627986][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 320.633896][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 320.653590][T10180] RSP: 0018:ffff8880660b1130 EFLAGS: 00010806 [ 320.659746][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 320.667896][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 320.675970][T10180] RBP: ffff8880660b1168 R08: ffffffff817dc75b R09: 0000000000000001 [ 320.684911][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 320.692896][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 320.700897][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 320.709941][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.716724][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 320.725315][T10180] Call Trace: [ 320.728900][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 320.736711][T10180] #PF: supervisor read access in kernel mode [ 320.742694][T10180] #PF: error_code(0x0000) - not-present page [ 320.748679][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 320.756249][T10180] Oops: 0000 [#29] PREEMPT SMP KASAN [ 320.761567][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 320.769307][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.779618][T10180] Workqueue: events bpf_prog_free_deferred [ 320.785656][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 320.791998][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 320.811986][T10180] RSP: 0018:ffff8880660b0d60 EFLAGS: 00010806 [ 320.818154][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 320.829481][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 320.837744][T10180] RBP: ffff8880660b0d98 R08: ffffffff817dc75b R09: 0000000000000001 [ 320.845829][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 320.854011][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 320.864526][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 320.873668][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.881337][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 320.890140][T10180] Call Trace: [ 320.893826][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 320.901954][T10180] #PF: supervisor read access in kernel mode [ 320.908328][T10180] #PF: error_code(0x0000) - not-present page [ 320.914507][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 320.922191][T10180] Oops: 0000 [#30] PREEMPT SMP KASAN [ 320.927513][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 320.935420][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.946584][T10180] Workqueue: events bpf_prog_free_deferred [ 320.956447][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 320.966533][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 320.993841][T10180] RSP: 0018:ffff8880660b0990 EFLAGS: 00010806 [ 321.003547][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 321.014150][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 321.031453][T10180] RBP: ffff8880660b09c8 R08: ffffffff817dc75b R09: 0000000000000001 [ 321.039866][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 321.047842][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 321.056198][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 321.065491][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 321.072861][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 321.081735][T10180] Call Trace: [ 321.085230][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 321.093032][T10180] #PF: supervisor read access in kernel mode [ 321.099193][T10180] #PF: error_code(0x0000) - not-present page [ 321.105170][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 321.112902][T10180] Thread overran stack, or stack corrupted [ 321.118733][T10180] Oops: 0000 [#31] PREEMPT SMP KASAN [ 321.124024][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 321.131746][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.143290][T10180] Workqueue: events bpf_prog_free_deferred [ 321.149121][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 321.155016][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 321.174642][T10180] RSP: 0018:ffff8880660b05c0 EFLAGS: 00010806 [ 321.180795][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 321.188766][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 321.196746][T10180] RBP: ffff8880660b05f8 R08: ffffffff817dc75b R09: 0000000000000001 [ 321.204726][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 321.212871][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 321.220856][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 321.229915][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 321.236603][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 321.244691][T10180] Call Trace: [ 321.248017][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 321.256011][T10180] #PF: supervisor read access in kernel mode [ 321.261991][T10180] #PF: error_code(0x0000) - not-present page [ 321.268431][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 321.276078][T10180] Thread overran stack, or stack corrupted [ 321.282449][T10180] Oops: 0000 [#32] PREEMPT SMP KASAN [ 321.288208][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 321.296011][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.306095][T10180] Workqueue: events bpf_prog_free_deferred [ 321.311992][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 321.318053][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 321.337880][T10180] RSP: 0018:ffff8880660b01f0 EFLAGS: 00010806 [ 321.343942][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 321.352026][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 321.360729][T10180] RBP: ffff8880660b0228 R08: ffffffff817dc75b R09: 0000000000000001 [ 321.368705][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 321.376764][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 321.384759][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 321.393776][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 321.400354][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 321.408341][T10180] Call Trace: [ 321.411675][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 321.419625][T10180] #PF: supervisor read access in kernel mode [ 321.425610][T10180] #PF: error_code(0x0000) - not-present page [ 321.431592][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 321.439154][T10180] Thread overran stack, or stack corrupted [ 321.444971][T10180] Oops: 0000 [#33] PREEMPT SMP KASAN [ 321.450264][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 321.458573][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.468771][T10180] Workqueue: events bpf_prog_free_deferred [ 321.474620][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 321.480558][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 321.500266][T10180] RSP: 0018:ffff8880660afe20 EFLAGS: 00010806 [ 321.507134][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 321.515312][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 321.523574][T10180] RBP: ffff8880660afe58 R08: ffffffff817dc75b R09: 0000000000000001 [ 321.531828][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 321.540545][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 321.548977][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 321.558225][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 321.565689][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 321.573694][T10180] Call Trace: [ 321.577009][T10180] ? __bad_area_nosemaphore+0x108/0x470 [ 321.582661][T10180] ? vprintk_emit+0x239/0x3a0 [ 321.587363][T10180] ? bad_area_nosemaphore+0x2d/0x40 [ 321.592667][T10180] ? __do_page_fault+0x1a4/0x1f0 [ 321.597599][T10180] ? do_page_fault+0x99/0xb0 [ 321.602293][T10180] ? page_fault+0x39/0x40 [ 321.606655][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 321.614385][T10180] #PF: supervisor read access in kernel mode [ 321.620472][T10180] #PF: error_code(0x0000) - not-present page [ 321.626479][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 321.634220][T10180] Thread overran stack, or stack corrupted [ 321.640039][T10180] Oops: 0000 [#34] PREEMPT SMP KASAN [ 321.645357][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 321.653071][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.663140][T10180] Workqueue: events bpf_prog_free_deferred [ 321.668956][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 321.674846][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 321.694539][T10180] RSP: 0018:ffff8880660afa50 EFLAGS: 00010806 [ 321.700627][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 321.708892][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 321.716970][T10180] RBP: ffff8880660afa88 R08: ffffffff817dc75b R09: 0000000000000001 [ 321.725030][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 321.733004][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 321.740976][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 321.749952][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 321.756737][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 321.764720][T10180] Call Trace: [ 321.768017][T10180] ? __bad_area_nosemaphore+0x108/0x470 [ 321.773663][T10180] ? vprintk_emit+0x239/0x3a0 [ 321.778350][T10180] ? bad_area_nosemaphore+0x2d/0x40 [ 321.783645][T10180] ? __do_page_fault+0x1a4/0x1f0 [ 321.788588][T10180] ? do_page_fault+0x99/0xb0 [ 321.793188][T10180] ? page_fault+0x39/0x40 [ 321.797563][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 321.805369][T10180] #PF: supervisor read access in kernel mode [ 321.811354][T10180] #PF: error_code(0x0000) - not-present page [ 321.817341][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 321.825080][T10180] Thread overran stack, or stack corrupted [ 321.830909][T10180] Oops: 0000 [#35] PREEMPT SMP KASAN [ 321.836278][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 321.844431][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.857093][T10180] Workqueue: events bpf_prog_free_deferred [ 321.863113][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 321.869105][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 321.889064][T10180] RSP: 0018:ffff8880660af680 EFLAGS: 00010806 [ 321.895159][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 321.903217][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 321.911208][T10180] RBP: ffff8880660af6b8 R08: ffffffff817dc75b R09: 0000000000000001 [ 321.919178][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 321.927166][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 321.935140][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 321.944249][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 321.950856][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 321.958831][T10180] Call Trace: [ 321.962331][T10180] ? __bad_area_nosemaphore+0x108/0x470 [ 321.968332][T10180] ? vprintk_emit+0x239/0x3a0 [ 321.973048][T10180] ? bad_area_nosemaphore+0x2d/0x40 [ 321.978261][T10180] ? __do_page_fault+0x1a4/0x1f0 [ 321.983649][T10180] ? do_page_fault+0x99/0xb0 [ 321.988263][T10180] ? page_fault+0x39/0x40 [ 321.992727][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 322.000790][T10180] #PF: supervisor read access in kernel mode [ 322.006785][T10180] #PF: error_code(0x0000) - not-present page [ 322.012946][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 322.020692][T10180] Thread overran stack, or stack corrupted [ 322.026594][T10180] Oops: 0000 [#36] PREEMPT SMP KASAN [ 322.031963][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 322.041578][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.051921][T10180] Workqueue: events bpf_prog_free_deferred [ 322.057843][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 322.064524][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 322.085080][T10180] RSP: 0018:ffff8880660af2b0 EFLAGS: 00010806 [ 322.091137][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 322.099871][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 322.108636][T10180] RBP: ffff8880660af2e8 R08: ffffffff817dc75b R09: 0000000000000001 [ 322.118991][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 322.127409][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 322.135992][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 322.145411][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 322.152109][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 322.160353][T10180] Call Trace: [ 322.164183][T10180] ? __bad_area_nosemaphore+0x108/0x470 [ 322.170088][T10180] ? vprintk_emit+0x239/0x3a0 [ 322.174794][T10180] ? bad_area_nosemaphore+0x2d/0x40 [ 322.180276][T10180] ? __do_page_fault+0x1a4/0x1f0 [ 322.185236][T10180] ? do_page_fault+0x99/0xb0 [ 322.192196][T10180] ? page_fault+0x39/0x40 [ 322.196563][T10180] BUG: unable to handle page fault for address: fffffbfff4002000 [ 322.204277][T10180] #PF: supervisor read access in kernel mode [ 322.210277][T10180] #PF: error_code(0x0000) - not-present page [ 322.216803][T10180] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 92adc067 PTE 0 [ 322.224357][T10180] Thread overran stack, or stack corrupted [ 322.230176][T10180] Oops: 0000 [#37] PREEMPT SMP KASAN [ 322.236454][T10180] CPU: 0 PID: 10180 Comm: kworker/0:3 Not tainted 5.3.0-rc3+ #68 [ 322.245670][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.255759][T10180] Workqueue: events bpf_prog_free_deferred [ 322.261603][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 322.270195][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 322.290697][T10180] RSP: 0018:ffff8880660aeee0 EFLAGS: 00010806 [ 322.296877][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 322.305817][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 322.321613][T10180] RBP: ffff8880660aef18 R08: ffffffff817dc75b R09: 0000000000000001 [ 322.335416][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 322.343851][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 322.352611][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 322.362412][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 322.369174][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 322.378780][T10180] Call Trace: [ 322.382321][T10180] Modules linked in: [ 322.386229][T10180] CR2: fffffbfff4002000 [ 322.390388][T10180] ---[ end trace 1369ea114b73e3ea ]--- [ 322.395847][T10180] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 322.401739][T10180] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 322.422911][T10180] RSP: 0018:ffff8880660b7828 EFLAGS: 00010806 [ 322.429498][T10180] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 322.437581][T10180] RDX: ffff8880660aa200 RSI: ffffffffff7a53e0 RDI: ffffffffa0010000 [ 322.445846][T10180] RBP: ffff8880660b7860 R08: ffffffff817dc75b R09: 0000000000000001 [ 322.453818][T10180] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 322.462575][T10180] R13: 0000000000000000 R14: ffffffffff7a53e0 R15: ffff88806087f838 [ 322.470545][T10180] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 322.479995][T10180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 322.487015][T10180] CR2: fffffbfff4002000 CR3: 0000000098c42000 CR4: 00000000001406f0 [ 322.494996][T10180] Kernel panic - not syncing: Fatal exception [ 322.502208][T10180] Kernel Offset: disabled [ 322.507497][T10180] Rebooting in 86400 seconds..