0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xec7b, 0x105000) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'bond_slave_1\x00', 0xba5}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) fallocate(r1, 0x4a, 0x314, 0x6c6c) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000600)={"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"}) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x3) epoll_wait(r2, &(0x7f0000000300)=[{}, {}, {}], 0x3, 0x13f67188) 21:57:51 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0xa000, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000300)=""/9, &(0x7f0000000340)=0x9) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x4, 0x400240) getsockname$inet6(r0, &(0x7f00000003c0), &(0x7f0000000400)=0x1c) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000440)={0x0, @loopback, @multicast1}, &(0x7f0000000480)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@multicast1=0xe0000001, 0x4e23, 0x9, 0x4e22, 0x9, 0xa, 0xa0, 0xa0, 0xff, r2, r3}, {0x7ff, 0x8, 0x9, 0x1, 0x7f, 0x5, 0x7, 0x400}, {0x0, 0x4, 0x5, 0x9}, 0x2, 0x6e6bb1, 0x0, 0x1, 0x3}, {{@in=@multicast2=0xe0000002, 0x4d2, 0x2b}, 0xa, @in6=@loopback={0x0, 0x1}, 0x3505, 0x2, 0x0, 0x3, 0x1, 0x9, 0x7fffffff}}, 0xe8) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000700)={'filter\x00', 0x31, "94540ada641dcdc886ed73168eab8f83a6666a98a05515b29a4f1e42097ba622499fa04c0644b0cf7aa2f3d9d39a17cb49"}, &(0x7f0000000780)=0x55) write$FUSE_OPEN(r0, &(0x7f00000007c0)={0x20, 0x0, 0x0, {0x0, 0x5}}, 0x20) gettid() ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000800)) socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000840)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000980)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000009c0)=0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000a00)=@sack_info={r5, 0x4, 0x7047}, &(0x7f0000000a40)=0xc) write$FUSE_STATFS(r1, &(0x7f0000000a80)={0x60, 0xfffffffffffffff5, 0x4, {{0xd1bc, 0x8, 0x8, 0x8000, 0x9, 0x9, 0x5, 0x6}}}, 0x60) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000b00)={0x1ff}, 0x4) r6 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000b40)={0x5, {{0x2, 0x4e24, @multicast2=0xe0000002}}, 0x1, 0x6, [{{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}}, {{0x2, 0x4e21}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e22}}, {{0x2, 0x4e20}}]}, 0x390) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000f00)) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000f40)={{0x3a, @empty, 0x4e24, 0x1, 'none\x00', 0x2, 0x40, 0x3c}, {@rand_addr=0x3, 0x4e20, 0x2, 0x10000, 0x2, 0x10000}}, 0x44) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$inet6_buf(r1, 0x29, 0xfd, &(0x7f0000000fc0)="91100ed0adb6bbb6ff9f04b60967daece298256d9e3e5f4bb9f4d4c4a2a10028c3452590c94766f2203d3e5d175f7d6b199180b6edcbc06dd865786057bfcbef4f04eacb32c3d55c8c1796c65e6864e507cebcce5040294cd2092a3d583f6235e7e5494a2dc1cb7d15603a98210935b50c95770bc6cf47b905c9f23f2c9dd3a019dfa95215bc2a84b43078325f62715876b5ac692612e33974aea68da9f000", 0x9f) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000010c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000001100)={0x7, 0x8, 0xfa00, {r7, 0x4}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000001140)={0x2, @dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x4, 'lc\x00', 0xa, 0x5, 0x18}, 0x2c) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)=0x0) fstat(r6, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000012c0)={0x0, 0x0, 0x0}, &(0x7f0000001300)=0xc) r11 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000001340)={0x2b8, 0x0, 0x1, [{{0x0, 0x0, 0x5e6, 0x0, 0x7, 0x7, {0x2, 0x65, 0x4, 0x8, 0xc178, 0x4, 0x1ffe0000000000, 0x0, 0x5, 0x3, 0x3, r3, r8, 0x0, 0x9}}, {0x2, 0x2, 0x7, 0x1000, 'filter\x00'}}, {{0x5, 0x3, 0x7, 0x8, 0x2, 0x9, {0x4, 0x81, 0x5, 0x0, 0x4, 0x100, 0x1f, 0x0, 0x2, 0x7, 0x4, r4, r9, 0x9, 0xba}}, {0x6, 0x3, 0xd, 0x1, '/dev/dmmidi#\x00'}}, {{0x0, 0x1, 0x3, 0x40, 0xfffffffffffffffb, 0x7, {0x0, 0x7fffffff, 0xdf65, 0x99c0, 0xcc2, 0x1, 0x101, 0x6, 0x7, 0x6, 0x5, r4, r10, 0xe33, 0x6}}, {0x5, 0xdf8, 0x10, 0x3, 'eth1mime_typelo}'}}, {{0x0, 0x2, 0x3, 0x3, 0x4, 0x8, {0x5, 0x3, 0xfff, 0x100000000, 0xe668, 0x759c, 0x2, 0x8000, 0x10001, 0x9, 0x3, r4, r11, 0xcfe9d21, 0x3ff}}, {0x1, 0x98f, 0x1c, 0x401, 'keyringposix_acl_accesswlan0'}}]}, 0x2b8) 21:57:51 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x100000, &(0x7f0000000400)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000240)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x2000, &(0x7f0000000140)=ANY=[@ANYBLOB]) 21:57:51 executing program 5 (fault-call:2 fault-nth:29): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xc2a5, 0x9, &(0x7f00000008c0)=[{&(0x7f00000002c0)="1e5c4ec6e24a02ea9b53a43e4c21701971226737aaf7049a3ce03c2598aa5586d0d80553f950b8be1b38eb28bc692b0241e01d5fe801467ef2125ee4a80762f64baf6ec9c86a08f2d3084c438550b2b8bd561c27d101bc410c5a8bd90d2355406bf98de8505f068a7c24bfb0b0664c84d217b6196f4fb6195c6b4966f2ac3233860a256e6ba82a0af2f23f9aa1843187d169fa4e371f376783cb2d06922713191bb76f49ba6cf7bfc0cb790261c0a7c0c9c4c5a038a6598647928c31fa6d01f713f01ebf2579f879d88cf93d6a76399c4669311c4d80ac24b8e96d598c466763d1f8213ea1f5266f", 0xe8, 0xfffffffffffffffc}, {&(0x7f0000000480)="8c976a89017937d8c3f1d7f1f46e90eccdf1159d39dc2e8b7d3eb5f0a975cf7d83cef497fba3f22e8e62f2937a42f0fa1a2c2aa2890689fc7c9727011fcf26451bf52ac578353a9a001bebfb085ce8e5464cbbb85ef0316f8db11cb5a6feffe822d42e881a25cf3cbd7cf920192b140acbdb08db5a59f9fea165beb4f001819af493225b6a59b9cf8de5eb0f3b24d194368be265f5fd78df083e650a6f66bd3ab9d4bf371ab7c7af024ffd96ccfcff205f3f7b873f33c32f34a424a606d4e786f35113fd9b39514525ccf818", 0xcc, 0x100000000}, {&(0x7f00000000c0)="9910e206e707b8851221", 0xa, 0x4}, {&(0x7f0000000200)="140d3d9256fc1aba4c213d8e0ee5f74750a466a4f87066b7c5b51af3919c72443835b03840159a4daa9a3d1db811010f4b7f3870e272aa877cdd0ba281d4b2b7f38007199f448085193281ffbd24f599ae1d100283609a82739e73fabbaa231f87586f78c0535a25f8e851a745ed3878b43a07137cf3c7244ef869365a6f", 0x7e, 0xfff}, {&(0x7f0000000580)="e9eec912fee8067e22f56b6527bad81120376d3a9b2d7bee423f86515e943a81a1e34d9a56086acc987654ba1177eac6d113cca450d3d516a8424ef644f6d21a9c4ab376c8b486694388ff84c0b9830b9c411b1cafb7deb65ba35840f0053b8e2ffdb4292927f1ecdefb4efb40dbc24a8ba9c9caf963693f3c7b7ae8c6fb6253501f77bf53cacbd3440beabd374884493bb45bd152c45f78df467f70dbce27c39d6c49ecc8", 0xa5, 0x1}, {&(0x7f0000000640)="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", 0xff, 0x3}, {&(0x7f0000000740)="69a4413173bb852246a8f550ea523cf125f2498e026a84498870b22af9bfc571fa11fd182ea72151f0077f1afed07e0ce68adf2d1e7b033d6da7b64ed3c2a6202493a828ac97733ff8049671", 0x4c, 0x81}, {&(0x7f00000007c0)="e16def41bfc2b82a5df43dafdb61989d80660bda26ff4d6cff5c3b9773afc6e5984da6ac94c53ba95f1717b74c1839ed58f1617dc51824b5880f2e86887ca9041b255f360e464bb2a2d1055afa0fd1daebe406b4198739ab589e7691dd9956479b646aabaa5dc2d589", 0x69, 0x7f}, {&(0x7f0000000840)="a26ad52618085be779130cdc90ba553e2fea548b9c03667fb59492c2266b1d6e3446978ef428bce99be9d61211364ee98077e2130ae3846af04634c3fa246012d0685f7e585f6a48da9da24a1dcd6a5964a8631e95a3362cac9cc79aee", 0x5d, 0x8}], 0x4080, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="02132d01020000008916400000000000"], 0x10}, 0x1}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="021200001100000026bd700700009887000000ad6f10babc00790000000800120003000000000000003800000006003200030800000900000000000000ac1414bb000000000000000000000000ac14142c0000000000000000000000000400040005000000f8450e1d6e43071f000000000700003f00000000000000039d4d56910b000500000001"], 0x88}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 21:57:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000340)={&(0x7f00000002c0)=@un=@abs, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000001000000010000001300000000000000"], 0x18}, 0x0) close(r1) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000040)=0x14) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@hci={0x1f, r2}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="c8a96799f49da7ef51305c23226affa487d20ba141902a01628b7633109baf1822f643ea11434e5356b1", 0x2a}], 0x1, &(0x7f0000000500)=[{0xf8, 0x0, 0xffff, "5000ea74007999061bbaca0e7e0f6dac51aa880eb374d73c2be0516e1a150ac962e19577b2b4ed2e8c93a3cc70b12d6cfb183cd370303b96cb724c5cc69293ac0ce230187363aad86a2a06a107ac22fa22e5075e96fb41d513fc12a472d1497b4123bd5b3cc4f02206f363c01d70764ec42dd716b9419233486e87a88af84a7ee65abd1d86840c9b5f343eb52a1a4a997327f8871aeda2b7d70e06e780b3535290d9f889323d1ea55c40c95c5db3ed05a3f9dae4d921238653e3954d56506e69128db637b19762e5b6e321b1b048fd4cc2573e1ec285247faef5496c7c46690eedec51adbcae"}, {0x60, 0x100, 0x3, "ecc0d7a5846a042d7f588af0435133f208f9bac30b4f7e4528efb6d2b52a47e69688d5ac16e9c2237180f811f8753172fdbfb797749d823987baf740806c2c8437db266192651422ec059777b4"}, {0x80, 0x119, 0x58a5870e, "d9b10f8488e516b36e2714dbdfa3bb4a2732eeae9afbbe85f049da45b00a0e60157bebd43189cdea2fe4832d2b6a2bd4ddd1913d034ec4375ea1d0377c0096adcf4fe01ed5ef3af3530f9e0272f7a1b0d9c5a12a9a8ee603edcd6c73408e55f425fea8e0bb3fbf14dd14d99a22413ec5"}, {0x38, 0x11f, 0x7, "06db7beef60564af294dac25ad28aa2bf733cbc1565f9fed703430d0c37877b51bafc10a"}, {0x98, 0x84, 0x6, "5eb3c721e62307a7d6e3245021d0ef2925fb4448e1868e5ffed5d81cb01de27786dbf20c4e29df1c7db05841a4107d8edf334d392a60aaed12d8614ff014bb960881dd0f8c02e1c2fc56859a679d95a301c43b0efbda61c5d1473486fc78550806e6c1d776e2d31506c0010f6efce5904c7442cfa5ee21cab8d4849836a8af325d2c75ba96"}, {0xc0, 0x118, 0x0, "3c81d75e7116d1f7dadc0249cda97ad7bef473f56c4383d8c628417b5cc24eed629d9e2b79c80813ff4dd2d3e78731f924e145c3e16885e400263ea140cc9d177c8305001accfee35eae3ce74f1806d38919746402938d8306e740834a0ae66a33aab9c4096035e8f6dba1f9121468bb4abd652f4fc4219642be26b265aeecfb88c3a3031007ea4280ba94dc871e2a06a9104cac4f27dd2edddfcd68e766d2e7cf7ad96b92d62effd9"}], 0x368, 0x800}, 0x800) 21:57:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5501, &(0x7f0000000080)) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="350000000600000000000000000000000500000000000000010000000000000004000000000000002f6465762f75696e7075740000"], 0x35) [ 205.717850] kernel msg: ebtables bug: please report to author: Wrong len argument [ 205.723116] IPVS: set_ctl: invalid protocol: 58 0.0.0.0:20004 [ 205.728320] FAULT_INJECTION: forcing a failure. [ 205.728320] name failslab, interval 1, probability 0, space 0, times 0 [ 205.742942] CPU: 0 PID: 10935 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 205.750328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.759682] Call Trace: [ 205.762288] dump_stack+0x1c9/0x2b4 [ 205.765933] ? dump_stack_print_info.cold.2+0x52/0x52 [ 205.771149] ? __lock_acquire+0x7fc/0x5020 [ 205.775392] ? do_raw_spin_unlock+0xa7/0x2f0 [ 205.779821] should_fail.cold.4+0xa/0x1a [ 205.783907] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 205.789039] ? trace_hardirqs_on+0x10/0x10 [ 205.793286] ? debug_check_no_obj_freed+0x30b/0x595 [ 205.798322] ? __lock_is_held+0xb5/0x140 [ 205.802401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.807943] ? ext4_ext_map_blocks+0xfb2/0x62f0 [ 205.812635] __should_failslab+0x124/0x180 [ 205.816889] should_failslab+0x9/0x14 [ 205.820700] kmem_cache_alloc+0x47/0x760 [ 205.821811] IPVS: set_ctl: invalid protocol: 58 0.0.0.0:20004 [ 205.824772] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 205.824790] ? ext4_es_can_be_merged+0x238/0x2a0 [ 205.824810] __es_insert_extent+0x305/0x1140 [ 205.844813] ? ext4_es_free_extent+0x820/0x820 [ 205.849410] ? lock_release+0xa30/0xa30 [ 205.853395] ? __lock_is_held+0xb5/0x140 [ 205.857464] ? kasan_check_write+0x14/0x20 [ 205.861713] ? do_raw_write_lock+0xbd/0x1b0 [ 205.866050] ext4_es_insert_extent+0x2ea/0x7e0 [ 205.870639] ? lock_release+0xa30/0xa30 [ 205.874622] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 205.880439] ? rcu_note_context_switch+0x730/0x730 [ 205.885384] ? down_write+0x8f/0x130 [ 205.889096] ? ext4_map_blocks+0x88b/0x1b60 [ 205.893424] ? down_read+0x1d0/0x1d0 [ 205.897153] ext4_map_blocks+0xb08/0x1b60 [ 205.901390] ? __save_stack_trace+0x8d/0xf0 [ 205.905725] ? ext4_issue_zeroout+0x190/0x190 [ 205.910344] ? save_stack+0x43/0xd0 [ 205.913968] ? __kasan_slab_free+0x11a/0x170 [ 205.918378] ? kasan_slab_free+0xe/0x10 [ 205.922352] ? kmem_cache_free+0x86/0x2d0 [ 205.926503] ext4_getblk+0x10e/0x630 [ 205.930223] ? ext4_iomap_begin+0x1350/0x1350 [ 205.934722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.940261] ? __dquot_initialize+0x61d/0xde0 [ 205.944760] ext4_bread+0x95/0x2b0 [ 205.948300] ? ext4_getblk+0x630/0x630 [ 205.952197] ? dquot_get_next_dqblk+0x180/0x180 [ 205.956877] ? debug_check_no_obj_freed+0x30b/0x595 [ 205.961911] ? kasan_check_write+0x14/0x20 [ 205.966151] ext4_append+0x14e/0x370 [ 205.969870] ext4_mkdir+0x532/0xe60 [ 205.973503] ? ext4_init_dot_dotdot+0x510/0x510 [ 205.978176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.983715] ? security_inode_permission+0xd2/0x100 [ 205.988737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.994276] ? security_inode_mkdir+0xe8/0x120 [ 205.998874] vfs_mkdir+0x42e/0x6b0 [ 206.002424] do_mkdirat+0x27b/0x310 [ 206.006058] ? __ia32_sys_mknod+0xb0/0xb0 [ 206.010298] ? ksys_ioctl+0x81/0xd0 [ 206.013930] __x64_sys_mkdir+0x5c/0x80 [ 206.017828] do_syscall_64+0x1b9/0x820 [ 206.021723] ? syscall_slow_exit_work+0x500/0x500 [ 206.026576] ? syscall_return_slowpath+0x5e0/0x5e0 [ 206.031506] ? syscall_return_slowpath+0x31d/0x5e0 [ 206.036471] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 206.041837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.046685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.051869] RIP: 0033:0x454eb7 21:57:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = getpgrp(0x0) fcntl$lock(r1, 0x0, &(0x7f0000000040)={0x2, 0x4, 0x200, 0xfffffffffffffe00, r2}) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000000)={0x6, 0x2, 0x8, 0x2, 0x3ff}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4002, 0x0) 21:57:52 executing program 6: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x121000, 0xa0) ioctl$sock_bt_hci(r0, 0xc00448ff, &(0x7f0000000300)="5da6bcc8698791d31158269e910b11ceabf9c8589fb163668cc49117f4db1e9c0775132a4328b1649cd0179d84e5b53e7b97ff2319f313540abbbaa1f8f35cc5346e2e26be8037db63921c71befc59a7a6324c7b5015b126e505215cf73719b0b336af5f85993ef0163af9f503ff5353e4b75ed1668230ab7b4cad2c474daf75cb2c0a505f80b37e9ad2a27895ac7d2cccb94e6417a57b782ae2f4d73570a3b4789bd9d25b432738ff3e114b9f8ffd32864868e75dd2a5d6568c05edad854d3b00f6ea1b89c6d32ba875ec72f06a5c10f0e49b6db5f9846b075cf5638d17c4a34d08fdfc1cb6bdac34") futimesat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x7530}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x100ffe, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000001c0)=""/15, &(0x7f0000000200)=0xf) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) write$FUSE_LK(r1, &(0x7f0000000100)={0x28}, 0xfdef) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000240)=0x2, 0x4) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x90802) sendfile(r2, r3, 0x0, 0x100007fffffff) 21:57:52 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x68b3, 0x8000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r1, 0x421, 0x70bd25, 0x25dfdbfd, {0x6}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x10}}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040}, 0x8080) r2 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000a80)='/dev/admmidi#\x00', 0xffffffffffffffff, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x690, 0x0, 0x460, 0x228, 0x0, 0x460, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, &(0x7f0000000300), {[{{@uncond, 0x0, 0xc8, 0xf0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2e}}}, {{@ipv6={@mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80, [], 0x1a}, [0xffffffff, 0xffffffff, 0x0, 0xff000000], [0xffffff00, 0xffffffff, 0xffffff00], 'teql0\x00', 'bond0\x00', {}, {0xff}, 0x2, 0x80000000, 0x2, 0x12}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote={0xfe, 0x80, [], 0xbb}, @ipv4=@multicast1=0xe0000001, 0x21, 0x1, 0x9}}}, {{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x9}, @loopback={0x0, 0x1}, [0xff0000ff, 0x0, 0x0, 0xffffffff], [0xffffffff, 0x0, 0xffffffff, 0xff0000ff], 'ifb0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x0, 0x9, 0x4, 0x4}, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x4}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x0, 0xffff, 0xfffffffffffffffd, 0x8, 0x1}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x40, 0x5, 0x1, [0x7, 0x9, 0x81, 0x91, 0x3, 0x51, 0x5, 0xff, 0xa2, 0x1000, 0x5, 0x81, 0x8, 0x20, 0x0, 0x5], 0x3}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0xfe29) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10480, 0x0) ioctl(r0, 0x7, &(0x7f0000000ac0)="d3ca5f1b08b85a7ab4786a8ee5e6af3604b62f9e4e4b0721b6420cad2b90cc454f7520e4c6a155dba3341caaf8b9ac22d5f383592ef2603d3cee93294cef2f19a980ba69a149735be83253cb969956068e0faba35be0eed6230d68d2139176a7c017d6b69b7db18fc491918ed1") perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0xfffffffffffffffa, 0x8, 0xb2, 0x7cf0, 0x0, 0x10000, 0x410, 0x1, 0xfffffffffffff55b, 0x4, 0x2, 0xec8, 0x100, 0x7, 0x1, 0x4, 0xffffffff, 0x1, 0x7ff, 0x7, 0x5, 0x5, 0x1a, 0xbe, 0x3, 0x2, 0x80000001, 0x9, 0x40, 0x0, 0x10001, 0x100000000, 0x1ff, 0x4, 0x9, 0x8a4b, 0x0, 0x8, 0x7, @perf_config_ext={0x4, 0x2}, 0x0, 0x9, 0x59a, 0x2, 0x3, 0x7, 0x7f}, r3, 0xf, r4, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0xc4c85513, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, "1059493481b639195a8a2dd9ee3ff7e9c50e58fe75430138d7f00cfe322bea8af5c4de2e32bb0a6e99f963f4"}) 21:57:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x3) ioctl(r0, 0x800008912, &(0x7f00000003c0)="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") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000240)={[{@creator={'creator', 0x3d, "9c573856"}, 0x37}]}) [ 206.055048] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.074449] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 206.082163] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000454eb7 [ 206.089436] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 00000000200001c0 [ 206.096708] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 206.103976] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 206.111242] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000001d [ 206.124746] jfs: Unrecognized mount option "u" or missing value [ 206.141486] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 21:57:52 executing program 5 (fault-call:2 fault-nth:30): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 206.197687] kernel msg: ebtables bug: please report to author: Wrong len argument 21:57:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xb870ca92, &(0x7f0000000280)=""/118, 0x3, 0x2}}, 0x39f) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000000)={0xf510, 0x80000000, 0x3}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @empty, 0x1, 0x3, [@broadcast=0xffffffff, @multicast1=0xe0000001, @multicast2=0xe0000002]}, 0x1c) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) [ 206.321633] hfsplus: creator requires a 4 character value [ 206.327281] hfsplus: unable to parse mount options [ 206.339778] FAULT_INJECTION: forcing a failure. [ 206.339778] name failslab, interval 1, probability 0, space 0, times 0 [ 206.351520] CPU: 1 PID: 10978 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 206.358893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.368247] Call Trace: [ 206.370851] dump_stack+0x1c9/0x2b4 [ 206.374493] ? dump_stack_print_info.cold.2+0x52/0x52 [ 206.379702] ? lock_downgrade+0x8f0/0x8f0 [ 206.383877] should_fail.cold.4+0xa/0x1a [ 206.387967] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 206.393098] ? graph_lock+0x170/0x170 [ 206.396911] ? __find_get_block+0xa3d/0xe60 [ 206.401248] ? graph_lock+0x170/0x170 [ 206.405062] ? trace_hardirqs_on+0xd/0x10 [ 206.409224] ? __find_get_block+0x36d/0xe60 [ 206.413560] ? __lock_is_held+0xb5/0x140 [ 206.417642] ? __lock_is_held+0xb5/0x140 [ 206.421725] ? check_same_owner+0x340/0x340 [ 206.426066] ? check_same_owner+0x340/0x340 [ 206.430399] ? rcu_note_context_switch+0x730/0x730 [ 206.435345] __should_failslab+0x124/0x180 [ 206.439605] should_failslab+0x9/0x14 [ 206.443419] kmem_cache_alloc+0x2af/0x760 [ 206.447586] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 206.452625] jbd2_journal_add_journal_head+0x1ef/0x5d0 [ 206.457918] ? jbd2_journal_write_metadata_buffer+0xf00/0xf00 [ 206.464033] jbd2_journal_get_create_access+0x42/0x600 [ 206.469324] ? rcu_note_context_switch+0x730/0x730 [ 206.474448] __ext4_journal_get_create_access+0x46/0x90 [ 206.479909] ext4_getblk+0x2be/0x630 [ 206.483642] ? ext4_iomap_begin+0x1350/0x1350 [ 206.488151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.493702] ? __dquot_initialize+0x61d/0xde0 [ 206.498215] ext4_bread+0x95/0x2b0 [ 206.501772] ? ext4_getblk+0x630/0x630 [ 206.505670] ? dquot_get_next_dqblk+0x180/0x180 [ 206.510358] ? debug_check_no_obj_freed+0x30b/0x595 [ 206.515390] ? kasan_check_write+0x14/0x20 21:57:52 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ec0)={&(0x7f00000007c0)={0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000800)=@dellink={0x28, 0x11, 0x22f, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8, 0x1c}]}, 0x28}, 0x1}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffff21, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000001c0)={@multicast2=0xe0000002, @empty, r2}, 0xc) 21:57:52 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = getpgrp(0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000001c0)="c853381594b50cf505ab2d8721255e06f845cdd4af7db906fbb08430db5af8b38d6d784b47c425be3c718cd84a367e80b68384f0d9d6ccbe8827b6753f719d254f64bc90f8c5b3b8512572e75287304811bd227e805d39779353b5a56ee6af60bcb60c81a37a2a055fc3f804586e0f3790ed83afd7bf005a1dcda9cf408bf224"}, 0x2) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000180)={r3, r0, 0xec}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000), 0x4) [ 206.519632] ext4_append+0x14e/0x370 [ 206.523351] ext4_mkdir+0x532/0xe60 [ 206.526987] ? ext4_init_dot_dotdot+0x510/0x510 [ 206.531660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.537197] ? security_inode_permission+0xd2/0x100 [ 206.542218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.547757] ? security_inode_mkdir+0xe8/0x120 [ 206.552356] vfs_mkdir+0x42e/0x6b0 [ 206.555909] do_mkdirat+0x27b/0x310 [ 206.559541] ? __ia32_sys_mknod+0xb0/0xb0 [ 206.564057] ? syscall_slow_exit_work+0x500/0x500 [ 206.568908] ? ksys_ioctl+0x81/0xd0 [ 206.573526] __x64_sys_mkdir+0x5c/0x80 [ 206.577427] do_syscall_64+0x1b9/0x820 [ 206.581320] ? finish_task_switch+0x1d3/0x870 [ 206.585822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 206.590756] ? syscall_return_slowpath+0x31d/0x5e0 [ 206.595696] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 206.601071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.605932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.611136] RIP: 0033:0x454eb7 [ 206.614321] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.633679] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 206.641395] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000454eb7 [ 206.648666] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 00000000200001c0 [ 206.655939] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 206.663208] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 206.670621] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000001e [ 206.678307] ENOMEM in journal_alloc_journal_head, retrying. [ 206.685208] jfs: Unrecognized mount option "u" or missing value [ 206.736676] hfsplus: creator requires a 4 character value [ 206.742358] hfsplus: unable to parse mount options 21:57:53 executing program 4: syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0xd9d9, 0x6, &(0x7f00000003c0)=[{&(0x7f00000000c0)="1d0bdfce46e9c92914426bd7a1d24f5a9aa94558ea65500909104845b20edc05b340b3234af548adcf95b082fcecd209ea1244a7e5f5c4440ad358ed2ed8ba0f430f37b36814b28c5369193a75907684", 0x50, 0x5}, {&(0x7f0000000140)="878a93290644efd71523f7f2506c09daaa371c55e7269439e3330054f153637d496206a501863eef713875ed4abe4572f88dec0d33472f9f9ffd33365aa3155a26ca256f319e08123c7eeef335221cc06413a1832300b991ad3dd94721697457e09ad9de4b2a435d1126baac5ca54e775052051e994d36779570c1ae775f42f8553ae79e73ab2b7e93f5c594b4929fa1d17ecb892e3f789d29ca5640d87c5849fc501b3c243310aec56a2be4457a0142952da7daacca3e7c94df48d7b802a4396d235706a2a813906678", 0xca, 0x20}, {&(0x7f0000000240)="aa5383a42ee562a79c4d97b9b15aa1eb09b08387a50954a41d7c89eb68fdcc7adf8784e8b2bf6a49e169f7b1ed608322591a86e95774481c300cc2715a982aaebf7a7516344bd839e352089c097b66dc9cf170082c0ee36b1236d5595680794705b7ea77ee9daf5b95ff72d0d264e23521639f00d1994629c1475df54452574fc4c963e2f0da91a479abd08c1d9b4f2c66da98b7b5c686b3e907ce428fd35ed9dfa7b3fba8fd630cd73fdd3700472bddc07e6ae0d90fc1ccef", 0xb9, 0x3f}, {&(0x7f0000000300)="a5279b62a0bd05", 0x7, 0x8}, {&(0x7f0000000340)="99973183da53b25ff0b1fb9e51969fd6c9598993cf78e5b51cab1a8ca0fb8783e61057ad396fc342d503ef8067a686", 0x2f, 0x1}, {&(0x7f0000000380)="6f52e3d0f16acb55b0d1642df08e6f17a9636a56bcd1e2a12985642793081b09ef3f6209", 0x24, 0x8}], 0x50040, &(0x7f0000000480)='vboxnet0\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x1, 0x101000) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000500)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4188aea7, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000000000800000000000000000000000000000000000000001000000000000000000000000000000000000000000000000"]) 21:57:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x1101082) r1 = memfd_create(&(0x7f0000000480)="2f64ff0000006f6f702300", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000200)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000100), 0xffffffff) ioctl$LOOP_CLR_FD(r0, 0x4c01) 21:57:53 executing program 7: r0 = socket(0x10, 0x3, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f0000000500)=[r1, 0x0]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[{0x2, 0x81b}, {0xb, 0x401}, {0x3, 0x10001}, {0xb, 0x1}, {0xc, 0x1ff}, {0x7, 0x8e5f}, {0x6, 0x240}, {0xe, 0x2}, {0x8, 0xa0}], 0x9) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x220000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r4}}, 0xc) 21:57:53 executing program 5 (fault-call:2 fault-nth:31): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:53 executing program 6: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 21:57:53 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) write$P9_RRENAME(r1, &(0x7f0000000180)={0x7, 0x15}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000', 0x2c}]}}) write$P9_RSYMLINK(r1, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0xb, 0x29, 0x1}, 0xb) fstat(r1, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000640)='9p\x00', 0x1000000000000000, &(0x7f0000000740)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none='cache=none', 0x2c}, {@privport='privport', 0x2c}, {@afid={'afid', 0x3d, 0xb2d}, 0x2c}, {@nodevmap='nodevmap', 0x2c}, {@access_any='access=any', 0x2c}, {@nodevmap='nodevmap', 0x2c}, {@cache_fscache='cache=fscache', 0x2c}, {@version_L='version=9p2000.L', 0x2c}, {@nodevmap='nodevmap', 0x2c}]}}) write$P9_RREAD(r1, &(0x7f0000000000)={0x39, 0x75, 0x2, {0x2e, "f625bfb748fba26d28563613dc97ce8f039ac73cc47d65362b5877128b556b32daf5b48ec5169ec0738f8e908ab9"}}, 0x39) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) open(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 21:57:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) 21:57:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0xefe0000000000004, &(0x7f0000000000)="295ee1311f16f477671070") rt_sigaction(0x0, &(0x7f0000000040), &(0x7f0000000080), 0xfffffffffffffd53, &(0x7f0000000140)) [ 207.177526] FAULT_INJECTION: forcing a failure. [ 207.177526] name failslab, interval 1, probability 0, space 0, times 0 [ 207.188856] CPU: 1 PID: 11028 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 207.196399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.205763] Call Trace: [ 207.208383] dump_stack+0x1c9/0x2b4 [ 207.212032] ? dump_stack_print_info.cold.2+0x52/0x52 [ 207.217252] should_fail.cold.4+0xa/0x1a [ 207.221336] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 207.226541] ? graph_lock+0x170/0x170 [ 207.230364] ? graph_lock+0x170/0x170 [ 207.234194] ? find_held_lock+0x36/0x1c0 [ 207.238289] ? check_same_owner+0x340/0x340 [ 207.242629] ? rcu_note_context_switch+0x730/0x730 [ 207.247588] __should_failslab+0x124/0x180 [ 207.251844] should_failslab+0x9/0x14 [ 207.255662] __kmalloc_track_caller+0x2c4/0x760 [ 207.260358] ? strncpy_from_user+0x510/0x510 [ 207.264782] ? strndup_user+0x77/0xd0 [ 207.268605] memdup_user+0x2c/0xa0 [ 207.272168] strndup_user+0x77/0xd0 [ 207.275813] ksys_mount+0x3c/0x140 [ 207.279374] __x64_sys_mount+0xbe/0x150 [ 207.283362] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 207.288401] do_syscall_64+0x1b9/0x820 [ 207.292301] ? finish_task_switch+0x1d3/0x870 [ 207.296809] ? syscall_return_slowpath+0x5e0/0x5e0 [ 207.301756] ? syscall_return_slowpath+0x31d/0x5e0 [ 207.306709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.312258] ? retint_user+0x18/0x18 [ 207.315993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.320865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.326064] RIP: 0033:0x4584aa [ 207.329254] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 207.348671] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 207.356465] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 207.363760] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 207.371057] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 207.378333] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 207.385613] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000001f 21:57:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/mcfilter6\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}}, 0x108) mount$9p_virtio(&(0x7f0000000280)='net/mcfilter6\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x40, &(0x7f0000000340)={'trans=virtio,', {[{@uname={'uname', 0x3d, 'net/mcfilter6\x00'}, 0x2c}, {@afid={'afid', 0x3d, 0x15673881}, 0x2c}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000240)) preadv(r1, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/35, 0x23}], 0x1, 0x400000b6) getrandom(&(0x7f0000000000)=""/214, 0xd6, 0x0) 21:57:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0xd30f, 0x30f, 0x5, 0x277, 0x4, 0xba7, 0x0, 0xfffffffffffffffc, r2}, &(0x7f0000000100)=0x20) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x32, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000200)={'lo\x00', 0x3}) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x1, 0x0, 0x1000, &(0x7f000000d000/0x1000)=nil}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000cff9)={r0, 0x18, &(0x7f000000c000)}, 0x10) 21:57:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) accept$unix(r1, 0x0, &(0x7f0000000080)) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0xfffffffffffffffd) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000040), 0x4) 21:57:53 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)="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") r2 = dup(r0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000000c0)={0xbd, @empty, 0x4e21, 0x4, 'ovf\x00', 0x10, 0x8000, 0x20}, 0x2c) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) read(r2, &(0x7f0000000240)=""/172, 0xed) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000080)={0x1ff}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'sit0\x00', {0x2, 0x4e24, @rand_addr=0x2}}) 21:57:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x1}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000380)=""/185) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2, 0xaacf}, 0x8) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)=ANY=[]) 21:57:53 executing program 5 (fault-call:2 fault-nth:32): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 207.588380] FAULT_INJECTION: forcing a failure. [ 207.588380] name failslab, interval 1, probability 0, space 0, times 0 [ 207.599730] CPU: 0 PID: 11056 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 207.607114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.616565] Call Trace: [ 207.619178] dump_stack+0x1c9/0x2b4 [ 207.622814] ? dump_stack_print_info.cold.2+0x52/0x52 [ 207.628008] ? __save_stack_trace+0x8d/0xf0 [ 207.632341] should_fail.cold.4+0xa/0x1a [ 207.636510] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 207.641601] ? save_stack+0x43/0xd0 [ 207.645217] ? kasan_kmalloc+0xc4/0xe0 [ 207.649109] ? __kmalloc_track_caller+0x14a/0x760 [ 207.653966] ? memdup_user+0x2c/0xa0 [ 207.657687] ? strndup_user+0x77/0xd0 [ 207.661478] ? graph_lock+0x170/0x170 [ 207.665273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.670632] ? find_held_lock+0x36/0x1c0 [ 207.674696] ? check_same_owner+0x340/0x340 [ 207.679030] ? lock_release+0xa30/0xa30 [ 207.683007] ? rcu_note_context_switch+0x730/0x730 [ 207.687939] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 207.692960] __should_failslab+0x124/0x180 [ 207.697191] should_failslab+0x9/0x14 [ 207.701003] __kmalloc_track_caller+0x2c4/0x760 [ 207.705669] ? strncpy_from_user+0x510/0x510 [ 207.710284] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.715817] ? strndup_user+0x77/0xd0 [ 207.719756] memdup_user+0x2c/0xa0 [ 207.723292] strndup_user+0x77/0xd0 [ 207.727038] ksys_mount+0x73/0x140 [ 207.730831] __x64_sys_mount+0xbe/0x150 [ 207.734793] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 207.739986] do_syscall_64+0x1b9/0x820 [ 207.743865] ? syscall_slow_exit_work+0x500/0x500 [ 207.748708] ? syscall_return_slowpath+0x5e0/0x5e0 [ 207.753639] ? syscall_return_slowpath+0x31d/0x5e0 [ 207.758565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.764103] ? retint_user+0x18/0x18 [ 207.767820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.772661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.777835] RIP: 0033:0x4584aa [ 207.781004] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 207.800261] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 207.807966] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 207.815231] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 207.822485] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 207.829736] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 207.836997] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000020 21:57:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="267700000008000066000000c9030000ec000000010000000000000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012e00)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) r1 = semget$private(0x0, 0x6, 0x20) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000001240)=""/29) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x13, "73369733af50af87644e8876791ec187c905cb"}, &(0x7f0000000140)=0x1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x1, 0x6, 0x81, 0x7fffffff, r2}, &(0x7f00000001c0)=0x10) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000200)=""/4096, &(0x7f0000001200)=0x1000) 21:57:54 executing program 6: r0 = memfd_create(&(0x7f0000000040)="df76626f786e65743100", 0x1) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x68, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x1000, @dev={0xfe, 0x80, [], 0x1e}, 0x5}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23, @rand_addr=0x3}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in6={0xa, 0x4e23, 0x4, @loopback={0x0, 0x1}}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r1, 0x4, 0x3, [0xfffffffffffffffd, 0x7f, 0x7]}, 0xe) syz_emit_ethernet(0x8e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)={0x2, 0x2000000001}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f00000002c0)) 21:57:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="7c1eb4376299ece6ed0ccb16b718adf0", 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') write$binfmt_script(r4, &(0x7f0000000240)={'#! ', './file0', [], 0xa}, 0xb) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r5, 0x408c5333, &(0x7f0000000080)={0x5, 0x4, 0x40, 'queue1\x00', 0x1}) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x80, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e1, &(0x7f0000000040)={r0}) 21:57:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000003000ff0a00000000000000000400000014000000ff020000000000ddffffffffffffff015d5cda17c9bcc9370ac8c0c96a21759e1750a7179492afef"], 0x28}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r2 = getpgid(0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x30c, 0x19, 0x400, 0x70bd2a, 0x25dfdbfb, {0x5}, [@nested={0x88, 0x31, [@generic="4239211e9858c2b6a4e1a249dce3de094c4d6da1d1da43e44acd165ed1c1908d9ea09a4811a4b37bb80a0862689e1d3b0bbe4c79a46ed24000e417a23e5da2db72696fd937b6237c505e151986e78691c075a48769128fb61824ca860765cd924f996b202858c23206e8472d1a6d", @typed={0x14, 0xb, @ipv6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}]}, @typed={0x8, 0x44, @uid=r1}, @nested={0x260, 0x71, [@typed={0x4, 0x6b}, @generic="74a4d18a89b36245887dac36a4a3c43983e881606609fbc8213c054fed695d52ebde5fc598e26165ce8fd5b08bca5edc00923b58579a6b045c08cb33a4d7c4667892488e8765172c2f73645a005c30d8e5e3b1f3dee22008ea0832bd3ce7dbfe3af0a884d0169296145f7453bf877421e43ed6331ee6914062b76336fedd8279f1748698803de19417e76524", @generic="8ce49c0106289df42caed0a4ba61bbdbdf3c803353830bee4df9dbb51167a140e51f93471d47f26adc0675cd93a8d8a03df5b55b74eddc6d4de2887a7d5fc18ae85bc8059c135ccce5eac091f51e84eb24d4d2b75ae34e32b7eca0fb22039d43a7fc854dd862506a4d3b3bc3a952005402a622e5f447d1ec54e20371ad7da47e3cc8bbccd1ac1a0e2704d862f2c1851fa379e3ff1d51ffbe965cb3633b65beede89996a80ad6fdbf627861074d4efb60e5e7cdc748f32eae1b94ade1b3964c3330bcdf5e4bc261c6397cfbe7c2b6da73fa95af1bbbbb9fac8b2a5fa6490de3ff7091e9e0b889a9e78cf38c52d4f91ae768677b8b295f68", @typed={0x4, 0x35}, @generic="c5966b0bed7b2ecc9405f4eaa8db3a5274da9c01c25aa8f88014fce14e7fb954721b64b0049ebd575a43841fef6ce0b4be18cdadc15043e4f17a99", @generic="55f6bcfe8120c89b9383e0c760a72367875216b8ca9f26eaa5a9985ce18eff473b26331a0456333cfe113b8984c938bdfbf160cc63f90353608d2f5a662194f6bb51146f29af87e8ebb9da9712b7cc6b552263e9423c9bf69ba0b5d4b740b627a8a7e7f82c640a542a4cfa5810e1ddcc22ac0e62bb1fc4a7ac8dc84799253aec10888b0538c67898e2fc9e63d8a7d58d69e7fe"]}, @typed={0x8, 0x29, @pid=r2}]}, 0x30c}, 0x1, 0x0, 0x0, 0x1}, 0x285cc094227f89e6) ptrace$pokeuser(0x6, r2, 0x401, 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ion\x00', 0x400, 0x0) 21:57:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000180)}], 0x0, &(0x7f00000014c0)={[{@nls={'nls', 0x3d, 'maciceland'}, 0x2c}, {@nodecompose='nodecompose', 0x2c}, {@nobarrier='nobarrier', 0x2c}]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={0x0, 0x0, 0x4, [0x3, 0x0, 0x4, 0xff]}, &(0x7f0000000340)=0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000380)={r3, 0x5, 0x7, 0xfff}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000100}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x90, r2, 0x800, 0x70bd26, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff001}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) 21:57:54 executing program 5 (fault-call:2 fault-nth:33): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:54 executing program 6: r0 = socket(0x5, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000d80)=@ipv4_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@RTA_MULTIPATH={0xc, 0x9, {0x8000}}]}, 0x28}, 0x1}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000240)=""/211) 21:57:54 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = socket$unix(0x1, 0x802, 0x0) bind$unix(r1, &(0x7f0000000240)=@abs={0x1}, 0x6e) connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.stat\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x98000, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000100)=0x5) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) connect$unix(r1, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000600)=0xe8) write$P9_RSTATu(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="600000007d020000004600640f0300000001010000000100000000000000000008caf08dcfee3ff36300010000000000000009006c6f2d656d3147504c0000070065746831656d3103002e288766646e6f000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7], 0x60) 21:57:54 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$int_in(r0, 0x5473, &(0x7f0000000100)=0x8) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/174, 0xae) 21:57:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) [ 208.229882] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 208.236799] FAULT_INJECTION: forcing a failure. [ 208.236799] name failslab, interval 1, probability 0, space 0, times 0 [ 208.250174] CPU: 1 PID: 11105 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 208.257547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.260445] hfsplus: unable to find HFS+ superblock [ 208.266902] Call Trace: [ 208.266933] dump_stack+0x1c9/0x2b4 [ 208.266959] ? dump_stack_print_info.cold.2+0x52/0x52 [ 208.266980] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 208.266996] ? __save_stack_trace+0x8d/0xf0 [ 208.267023] should_fail.cold.4+0xa/0x1a [ 208.267042] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 208.267062] ? save_stack+0x43/0xd0 [ 208.306996] ? kasan_kmalloc+0xc4/0xe0 [ 208.311054] ? __kmalloc_track_caller+0x14a/0x760 [ 208.315887] ? memdup_user+0x2c/0xa0 [ 208.319676] ? strndup_user+0x77/0xd0 [ 208.323470] ? graph_lock+0x170/0x170 [ 208.327278] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.332635] ? find_held_lock+0x36/0x1c0 [ 208.336702] ? check_same_owner+0x340/0x340 [ 208.341015] ? lock_release+0xa30/0xa30 [ 208.344982] ? rcu_note_context_switch+0x730/0x730 [ 208.349900] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 208.354909] __should_failslab+0x124/0x180 [ 208.359136] should_failslab+0x9/0x14 [ 208.362941] __kmalloc_track_caller+0x2c4/0x760 [ 208.367599] ? strncpy_from_user+0x510/0x510 [ 208.371995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.377526] ? strndup_user+0x77/0xd0 [ 208.381325] memdup_user+0x2c/0xa0 [ 208.384856] strndup_user+0x77/0xd0 [ 208.388472] ksys_mount+0x73/0x140 [ 208.392001] __x64_sys_mount+0xbe/0x150 [ 208.396003] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 208.401020] do_syscall_64+0x1b9/0x820 [ 208.404897] ? syscall_slow_exit_work+0x500/0x500 [ 208.409743] ? syscall_return_slowpath+0x5e0/0x5e0 [ 208.414682] ? syscall_return_slowpath+0x31d/0x5e0 [ 208.419612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.425135] ? retint_user+0x18/0x18 [ 208.428839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.433939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.439114] RIP: 0033:0x4584aa [ 208.442283] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 208.461560] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 208.469525] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 208.476790] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 208.484068] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 208.491323] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 208.498581] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000021 [ 208.516375] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 21:57:54 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000000)={{0x0, 0x400000000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, {}, {0x0, 0x11f004, 0x0, 0x0, 0x7fffffff, 0xc, 0x2, 0x2, 0x0, 0x0, 0x6d50}, {0x2004, 0x0, 0xf, 0x9, 0x6, 0x2}, {0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe7dc, 0x1, 0x0, 0x81}, {0x0, 0x3000, 0xf, 0x5, 0x7ff, 0x0, 0x0, 0x0, 0xc8}, {0x0, 0x16000, 0xf}}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xc00, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/autofs\x00', 0x100, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000d00)={r3, r4, 0xa0b6, 0x80, &(0x7f0000000c40)="e9a1f07718e2371768a81b0eef905ccc477fdf4714f36be6ab9bec8e60e4f42ff5ed4a3d66da5a76d17cb36d8011968306882aca867da46d6b14d70e31e3af8b685215375e447ed91de871a52d14ae2db06f3cff506f925e8112cea137c97407dca0cb703759d6001fead0f293c666b0802a1d0766251b8dd752c6a04ae59da134488eafa67a47dedc272472dfdc850b12", 0x1, 0xff, 0x6f88, 0x3, 0x5, 0x4, 0xffff, "6fe2a781e4ee8c38f5278028a8533521da665459e8b2a01c5ee52cad960a5f1b27563b5aceaa599ad7bbc55e9699451d88691ee52aa7d49c3a11a4d0bbcf84b29de836333bd7469e710e2218271bd698d9ca70a09d644dc85b95e0e963d90fa5a8235341b0fd0cc7b2367f7ec95529d9b1c7202ab95a59053f55710cfe75c974465cbe887e83382944734301cb67f86390"}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) connect$llc(r4, &(0x7f0000000180)={0x1a, 0x4, 0x1, 0x92c8, 0x200, 0x5, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000580), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 21:57:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c4600000000000000000000000002000600001100000000000040000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000010000000000000000000000"], 0x58) 21:57:54 executing program 5 (fault-call:2 fault-nth:34): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 208.562218] hfsplus: unable to find HFS+ superblock 21:57:54 executing program 6: r0 = memfd_create(&(0x7f0000049000)='selinux\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f000000f000)='/dev/snd/seq\x00', 0x0, 0x180) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f000004d000)={0x80, 0x1, 'client1\x00', 0xffffffff80000006, "0000da00001effe3", "a6e7fd491ca076ef11ae80ffea002000040004002ecd959baa11a50700000001"}) write$sndseq(r1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}}], 0x30) [ 208.676283] FAULT_INJECTION: forcing a failure. [ 208.676283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 208.688141] CPU: 1 PID: 11132 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 208.695512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.704876] Call Trace: [ 208.707486] dump_stack+0x1c9/0x2b4 [ 208.711139] ? dump_stack_print_info.cold.2+0x52/0x52 [ 208.716355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:57:54 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x2, 0x4) readv(r0, &(0x7f0000000140)=[{&(0x7f0000006f07)=""/249, 0xfffffffffffffda7}], 0x54) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x0, 0xb00a}, {0x401, 0x4}, 0x9, 0x6, 0x7}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x24, 0x37, 0x1, 0x13, 0x0, 0x16e, 0x3, 0x30}}) socket$xdp(0x2c, 0x3, 0x0) ioctl$int_in(r0, 0x80000000005001, &(0x7f0000003ff8)) 21:57:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x5, 0x3, 0x2, 0xfff, 0x0, 0x8, 0xb83b, 0x9, 0x4, 0x9, 0xfffffffffffff801}, 0xb) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0xee13}}, 0x9, 0x10001}, &(0x7f0000000180)=0xfffffffffffffe0e) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r1, 0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x10, &(0x7f00000001c0)={r3}, 0x8) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)) [ 208.721906] ? __perf_event_task_sched_in+0x24f/0xbb0 [ 208.727120] should_fail.cold.4+0xa/0x1a [ 208.731201] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 208.736332] ? lock_downgrade+0x8f0/0x8f0 [ 208.740497] ? finish_task_switch+0x18a/0x870 [ 208.745017] ? kasan_check_read+0x11/0x20 [ 208.749180] ? do_raw_spin_unlock+0xa7/0x2f0 [ 208.753598] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 208.758200] ? compat_start_thread+0x80/0x80 [ 208.762620] ? _raw_spin_unlock_irq+0x27/0x70 [ 208.767135] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 208.772170] ? trace_hardirqs_on+0xd/0x10 21:57:55 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x101100) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000140)={0x80003, 0x0, [0x5700, 0xfff, 0xca, 0xff, 0x9, 0x1d, 0x7, 0x8]}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x15, 0xfffffffffffffffe, 0x7) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev={0xac, 0x14, 0x14}}, @igmp={0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}}}}}}, &(0x7f0000000200)) syz_extract_tcp_res(&(0x7f0000000080), 0x4, 0x9) [ 208.776335] ? _raw_spin_unlock_irq+0x27/0x70 [ 208.780847] ? finish_task_switch+0x18a/0x870 [ 208.785365] ? preempt_notifier_register+0x200/0x200 [ 208.790483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.796036] ? should_fail+0x223/0xbed [ 208.799945] __alloc_pages_nodemask+0x36e/0xdb0 [ 208.804635] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 208.809677] ? __sched_text_start+0x8/0x8 [ 208.813837] ? find_held_lock+0x36/0x1c0 [ 208.817936] ? check_same_owner+0x340/0x340 [ 208.822276] cache_grow_begin+0x91/0x710 [ 208.826375] kmem_cache_alloc+0x689/0x760 [ 208.830553] getname_flags+0xd0/0x5a0 [ 208.834393] user_path_at_empty+0x2d/0x50 [ 208.838643] do_mount+0x17a/0x30e0 [ 208.841150] sctp: [Deprecated]: syz-executor4 (pid 11150) Use of int in maxseg socket option. [ 208.841150] Use struct sctp_assoc_value instead [ 208.842197] ? copy_mount_string+0x40/0x40 [ 208.842221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 208.842247] ? retint_kernel+0x10/0x10 [ 208.842275] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 21:57:55 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x201, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1813, r0, 0x0) r1 = geteuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000180)={0x85, 0x7d, 0x2, {{0x0, 0x62, 0x100, 0x7, {0x2, 0x4}, 0x200000, 0x0, 0x9, 0x0, 0x4, 'eth1', 0xa, '/dev/null\x00', 0x17, "3a2f7d776c616e30295c2a776c616e31776c616e312aa1", 0xa, '/dev/null\x00'}, 0xe, 'Mem0{/selinux+', r1, r2, r3}}, 0x85) 21:57:55 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0200027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x29) [ 208.873824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.879367] ? copy_mount_options+0x285/0x380 [ 208.883872] ksys_mount+0x12d/0x140 [ 208.887509] __x64_sys_mount+0xbe/0x150 [ 208.891503] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 208.896531] do_syscall_64+0x1b9/0x820 [ 208.900598] ? finish_task_switch+0x1d3/0x870 [ 208.905103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 208.910055] ? syscall_return_slowpath+0x31d/0x5e0 [ 208.914995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.915758] sctp: [Deprecated]: syz-executor4 (pid 11150) Use of int in maxseg socket option. [ 208.915758] Use struct sctp_assoc_value instead [ 208.920532] ? retint_user+0x18/0x18 [ 208.920555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.920581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.920593] RIP: 0033:0x4584aa [ 208.920597] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 21:57:55 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x208000, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000080)={0x0, 0xff, 0x9, &(0x7f0000000040)=0x3}) r1 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x2, &(0x7f0000002340), 0x4) 21:57:55 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000)=0x7fff, 0x4) socket$inet6(0xa, 0x1000000000002, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000100)={0xfffffffffffffe61, 0x7, 0x2, {{0x36c, '/dev/snapshot\x00'}, 0x101}}, 0xfffffffffffffd13) ioctl(r0, 0x8912, &(0x7f0000000040)="025c0800ed345f9b7620705291a605624deb96c737cce4eaefff682545365b7ad458e5b2ee6cb349") r3 = dup(r2) getsockname$llc(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2011, r3, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x80083313, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000200), r4}}, 0x18) [ 208.960712] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 208.970041] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 208.970059] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 208.970068] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 208.970078] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 208.970087] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 208.970096] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000022 [ 208.978074] jfs: Unrecognized mount option "u" or missing value [ 209.008783] sctp: [Deprecated]: syz-executor4 (pid 11150) Use of struct sctp_assoc_value in delayed_ack socket option. [ 209.008783] Use struct sctp_sack_info instead 21:57:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r1, 0x0) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000080)=0x0, &(0x7f0000000140), &(0x7f0000000180)) setregid(r2, r3) 21:57:55 executing program 6: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0x9f, "a8cbd2d6e0cddf92abe064b2064b7e0d2e590a3f0ef99c53781e52227baf2c21a62cd4f45e1722466a78cb0a7e6077ed520f2be0e0fbd8fb58126180fd4bee445abcca51611fd52de2227ce80285ee7018facfc5e71a9b678f8ec212a93fd6ca373c6579970aadb7026a70933b11774a2a274427b711300881dd4d877a5627b48988f6bc197d42603687e2c3b16ececdc7ff2fb6359931faa938dfa2ec8460"}, &(0x7f0000000500)=0xa7) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000540)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}, [0x5, 0x10000000000000, 0x6, 0x1, 0x7ff, 0x4, 0x4, 0xe5, 0xa926, 0x101, 0x80000000, 0xfffffffffffffff9, 0x4, 0x1000]}, &(0x7f0000000640)=0x100) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x24f}, 0x1}, 0x0) r4 = getpgid(0xffffffffffffffff) wait4(r4, &(0x7f0000000680), 0x2, &(0x7f00000006c0)) r5 = creat(&(0x7f0000000380)='./file0\x00', 0x20) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x3d, "dda64ad3671fc2e9f6245088340159d0c5e1e7b35c8ab9e6ab04264d2efa21bfa42835f96a4d8afc13893f82f6b941e4dddac22d57fe9f10182b161dcc"}, &(0x7f0000000040)=0x45) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r6, 0x0, 0x4, [0x8, 0x7, 0xffffffffffffff81, 0x101]}, &(0x7f00000002c0)=0x10) semget(0x1, 0x0, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000340)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}, 0x1}, 0x0) [ 209.170676] sctp: [Deprecated]: syz-executor4 (pid 11150) Use of int in maxseg socket option. [ 209.170676] Use struct sctp_assoc_value instead [ 209.200835] sctp: [Deprecated]: syz-executor4 (pid 11179) Use of int in maxseg socket option. [ 209.200835] Use struct sctp_assoc_value instead 21:57:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000001c0)={0x100, {{0xa, 0x4e20, 0x3, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8a29}}}, 0x88) clock_gettime(0x0, &(0x7f0000001580)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000740)={0x14, 0x1a, 0x201}, 0x14}, 0x1}, 0x0) 21:57:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xffff, 0x1b, 0x1, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x400000008912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) 21:57:55 executing program 3: r0 = socket$inet6(0xa, 0x100000000000, 0x3d9c) ioctl(r0, 0x100, &(0x7f0000000500)="025cc83d6d345f8f762070") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0200027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ea2d8c3b60a700000000003b228fcb8c613f1ab02fd88da03f127a3a665978c0c3120e6f6708c5defa220a4af291ee3a688cab0f881a687dfa24b2ebbb928d56d43ac8b5cf448d7f1c1a079c72f3d2aa07ed8ec76865eb5d6016d03f78b01ec9d577ea3fe42a250f3f76b759ef2fcfbbd7ce7280f172da0e88f1acd0ec4761d48ef981cacaae6ba0ca4b8feb353df1216e24db08487bf8886bd71143328680b387b19329dd12723be27300000036da44c7502c969ff49f1eb488e10c872686f31d5354ba39780f4fefc484d335e440c8a904fe968d2236859e1e6e1656dc8db2"]) umount2(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) 21:57:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) 21:57:55 executing program 5 (fault-call:2 fault-nth:35): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:55 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) getsockname$packet(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', r1}) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000001280)={&(0x7f0000001200)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80}}]}, 0x2c}, 0x1}, 0x0) recvfrom$inet6(r0, &(0x7f0000000440)=""/234, 0xea, 0x2000, &(0x7f0000000140)={0xa, 0x4e22, 0x9, @loopback={0x0, 0x1}, 0x4}, 0x1c) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10000, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="2a0000000400000000000000000000000100000000000000018200000000000002000000000000000000"], 0x2a) [ 209.257167] sctp: [Deprecated]: syz-executor4 (pid 11150) Use of struct sctp_assoc_value in delayed_ack socket option. [ 209.257167] Use struct sctp_sack_info instead 21:57:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") seccomp(0x1, 0x0, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) timer_create(0x3, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000000000)) socket$vsock_dgram(0x28, 0x2, 0x0) exit(0xff) timer_delete(0x0) [ 209.338107] FAT-fs (loop3): Unrecognized mount option "ê-Œ;`§" or missing value [ 209.360617] FAULT_INJECTION: forcing a failure. [ 209.360617] name failslab, interval 1, probability 0, space 0, times 0 [ 209.372160] CPU: 1 PID: 11200 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 209.379532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.388898] Call Trace: [ 209.391505] dump_stack+0x1c9/0x2b4 [ 209.395144] ? dump_stack_print_info.cold.2+0x52/0x52 [ 209.400328] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 209.405161] ? lock_downgrade+0x8f0/0x8f0 [ 209.409310] should_fail.cold.4+0xa/0x1a [ 209.413368] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 209.418460] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 209.423048] ? is_bpf_text_address+0xd7/0x170 [ 209.427536] ? find_held_lock+0x36/0x1c0 [ 209.431616] ? check_same_owner+0x340/0x340 [ 209.435926] ? kasan_slab_free+0xe/0x10 [ 209.439898] ? kmem_cache_free+0x86/0x2d0 [ 209.444126] ? putname+0xf2/0x130 [ 209.447568] ? rcu_note_context_switch+0x730/0x730 [ 209.452489] ? ksys_mount+0x12d/0x140 [ 209.456285] ? __x64_sys_mount+0xbe/0x150 [ 209.460434] __should_failslab+0x124/0x180 [ 209.464669] should_failslab+0x9/0x14 [ 209.468458] kmem_cache_alloc+0x2af/0x760 [ 209.472599] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 209.477431] ? do_raw_spin_lock+0xc1/0x200 [ 209.481662] alloc_vfsmnt+0xe8/0x9f0 [ 209.485385] ? mnt_free_id.isra.27+0x60/0x60 [ 209.489790] ? graph_lock+0x170/0x170 [ 209.493576] ? rcu_pm_notify+0xc0/0xc0 [ 209.497456] ? putname+0xf2/0x130 [ 209.500908] ? find_held_lock+0x36/0x1c0 [ 209.504967] ? lock_downgrade+0x8f0/0x8f0 [ 209.509107] ? module_unload_free+0x5d0/0x5d0 [ 209.513594] ? lock_release+0xa30/0xa30 [ 209.517573] ? mpi_free.cold.1+0x19/0x19 [ 209.521636] vfs_kern_mount.part.34+0x90/0x4e0 [ 209.526207] ? may_umount+0xb0/0xb0 [ 209.529823] ? _raw_read_unlock+0x22/0x30 [ 209.533959] ? __get_fs_type+0x97/0xc0 [ 209.537839] do_mount+0x581/0x30e0 [ 209.541370] ? copy_mount_string+0x40/0x40 [ 209.545614] ? copy_mount_options+0x5f/0x380 [ 209.550014] ? rcu_read_lock_sched_held+0x108/0x120 [ 209.555027] ? kmem_cache_alloc_trace+0x616/0x780 [ 209.559871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.565415] ? _copy_from_user+0xdf/0x150 [ 209.569554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.575079] ? copy_mount_options+0x285/0x380 [ 209.579578] ksys_mount+0x12d/0x140 [ 209.583194] __x64_sys_mount+0xbe/0x150 [ 209.587158] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 209.592167] do_syscall_64+0x1b9/0x820 [ 209.596044] ? finish_task_switch+0x1d3/0x870 [ 209.600531] ? syscall_return_slowpath+0x5e0/0x5e0 [ 209.605538] ? syscall_return_slowpath+0x31d/0x5e0 [ 209.610458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.615982] ? retint_user+0x18/0x18 [ 209.619691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.624531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.629708] RIP: 0033:0x4584aa [ 209.632879] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 209.652223] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 209.659922] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 209.667188] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 209.674444] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 209.681699] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 21:57:55 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xe0}, 0x1}, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200)=0x5, 0x4) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000380)={'eql\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) socketpair$inet6(0xa, 0xa, 0x110001, &(0x7f00000003c0)) 21:57:56 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xd540}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000200)=""/51) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000080)=""/114) 21:57:56 executing program 5 (fault-call:2 fault-nth:36): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 209.688956] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000023 [ 209.719477] FAT-fs (loop3): Unrecognized mount option "ê-Œ;`§" or missing value 21:57:56 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000080)="a48c235e08ecba7b4d1b62dc0dbeb8fe6026985073f594dcdbff4a683516768bb91870998f2bd78ea91f4db8f7cc0b11d3e5c02adbbd1d691c9dd2bd6ed301154c4318b89f0da6eed7a04a9140f59b4163e89883f8e9000020000000"}, 0x10) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=@polexpire={0xc0, 0x1b, 0x0, 0x0, 0x0, {{{@in6, @in6}}}}, 0xc0}, 0x1}, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) open_by_handle_at(r0, &(0x7f0000000140)={0x22, 0x1, "131269fe41b2b3f1e254f068d7fa5ec12320017fa80391cda03a"}, 0x10000) tkill(r1, 0x28) writev(r0, &(0x7f0000000080), 0x1000000000000033) 21:57:56 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x100) dup2(r3, r2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000001340)={0x0, 0x1}, &(0x7f0000001380)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000001400)={&(0x7f0000000080)=@in={0x2, 0x4e21, @loopback=0x7f000001}, 0x10, &(0x7f00000012c0)=[{&(0x7f00000000c0)="a0baa461857af90fc193a59f454db6e9ea76aac9c0e6ad19c9215b6e2762e6284a6f129b91c2801a7cb1be4107d92d29ad09fb68369e68fbda", 0x39}, {&(0x7f0000000100)="645ac1861008d55ddb19e123a02034b2c1ee8df48dd2b457deb1a3296e113c31280ccc02088687036c80fe8224a37f1772f33a85a15c5dfbd422d30c856e3503afce67ddc9ce4b95b5b22413c18c70bec2ccf3fe63022e2aabf5da4ccbdcf0b87c80321fb0ed1d16270ce2ece5fcd4528a43695f96b7a2c3d28f8ab25b68598c93ca015b0598498c76f25bb23d4065d8983e6f9738235d6059746a726c66c55df6ce33b7122b30dc6923a5f51c80aaf0ae421488f445bd606cde43e19d883958e6a700de757b198fd498f62c00aa9db5908998eb71d811c8c679ac96d0a79b5e1640e3b204b1450b8ab223", 0xeb}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="61781e9771da74beb1e9886340d6886e7ee5188a55ec92d0328acb43134df85e5de747ecc210b391008bcaa615d48811f8b810ed066e11f8c9b665ae73c06d52acdfd3ba8d1ec7d92119f2e05183005699050111af21396018e68ef6f3", 0x5d}, {&(0x7f0000001280)="db3549629cfc5406", 0x8}], 0x5, &(0x7f00000013c0)=[@dstaddrv4={0x18, 0x84, 0x7, @broadcast=0xffffffff}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x3, 0x2, 0x0, r4}}], 0x38, 0x4000880}, 0x800) sendmsg$nl_generic(r0, &(0x7f0000008000)={&(0x7f0000cceff4)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000731ef4)={0x20, 0x27, 0x829, 0x0, 0x0, {0x11}, [@nested={0xc, 0x9, [@typed={0x8, 0x1, @ipv4=@broadcast=0xff0f0f00}]}]}, 0x20}, 0x1}, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000001480)=""/153) ioctl$VT_RELDISP(r3, 0x5605) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000001440)=0x0) sched_getscheduler(r5) [ 209.840590] FAULT_INJECTION: forcing a failure. [ 209.840590] name failslab, interval 1, probability 0, space 0, times 0 [ 209.851947] CPU: 0 PID: 11223 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 209.859315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.868669] Call Trace: [ 209.871273] dump_stack+0x1c9/0x2b4 [ 209.874927] ? dump_stack_print_info.cold.2+0x52/0x52 [ 209.880144] ? lock_downgrade+0x8f0/0x8f0 [ 209.884313] should_fail.cold.4+0xa/0x1a [ 209.888392] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 209.893513] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 209.897935] ? is_bpf_text_address+0xd7/0x170 [ 209.902450] ? find_held_lock+0x36/0x1c0 [ 209.906542] ? check_same_owner+0x340/0x340 [ 209.910901] ? kasan_slab_free+0xe/0x10 [ 209.914912] ? kmem_cache_free+0x86/0x2d0 [ 209.919068] ? putname+0xf2/0x130 [ 209.922531] ? rcu_note_context_switch+0x730/0x730 [ 209.927474] ? ksys_mount+0x12d/0x140 [ 209.931285] ? __x64_sys_mount+0xbe/0x150 [ 209.935445] __should_failslab+0x124/0x180 21:57:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r1, &(0x7f0000000040)=""/182, 0xb6) getdents(r1, &(0x7f0000000100)=""/49, 0x20000285) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, r2}) 21:57:56 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaa9faaaaaaaa7daaaaaa009100370081000200862b00fe8000000000000000000000000000bbfe8000000000fc0000000000000000aa000002060008907800000000000000"], &(0x7f0000000040)={0x20000000, 0x0, [0x0, 0xe3]}) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) [ 209.939695] should_failslab+0x9/0x14 [ 209.943524] kmem_cache_alloc+0x2af/0x760 [ 209.947686] ? kasan_check_write+0x14/0x20 [ 209.951930] ? do_raw_spin_lock+0xc1/0x200 [ 209.956181] alloc_vfsmnt+0xe8/0x9f0 [ 209.959904] ? mnt_free_id.isra.27+0x60/0x60 [ 209.964328] ? graph_lock+0x170/0x170 [ 209.968136] ? rcu_pm_notify+0xc0/0xc0 [ 209.972041] ? putname+0xf2/0x130 [ 209.975515] ? find_held_lock+0x36/0x1c0 [ 209.979596] ? lock_downgrade+0x8f0/0x8f0 [ 209.983763] ? module_unload_free+0x5d0/0x5d0 [ 209.988265] ? lock_release+0xa30/0xa30 [ 209.992251] ? mpi_free.cold.1+0x19/0x19 [ 209.996325] vfs_kern_mount.part.34+0x90/0x4e0 [ 210.000915] ? may_umount+0xb0/0xb0 [ 210.004539] ? _raw_read_unlock+0x22/0x30 [ 210.008685] ? __get_fs_type+0x97/0xc0 [ 210.012578] do_mount+0x581/0x30e0 [ 210.016123] ? copy_mount_string+0x40/0x40 [ 210.020351] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.025104] ? retint_kernel+0x10/0x10 [ 210.028991] ? copy_mount_options+0x1f0/0x380 [ 210.033483] ? copy_mount_options+0x1fa/0x380 [ 210.037969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.043495] ? copy_mount_options+0x285/0x380 [ 210.047982] ksys_mount+0x12d/0x140 [ 210.051601] __x64_sys_mount+0xbe/0x150 [ 210.055657] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 210.060665] do_syscall_64+0x1b9/0x820 [ 210.064539] ? syscall_slow_exit_work+0x500/0x500 [ 210.069371] ? syscall_return_slowpath+0x5e0/0x5e0 [ 210.074287] ? syscall_return_slowpath+0x31d/0x5e0 [ 210.079207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.084738] ? retint_user+0x18/0x18 [ 210.088444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.093281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.098457] RIP: 0033:0x4584aa [ 210.101631] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 210.121077] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 210.128772] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 210.136030] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 210.143287] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 210.150542] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 210.157794] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000024 21:57:56 executing program 7: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0xc00) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/140) write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18, 0xd, 0x2, {{0x9, 0x0, 0x8}, 0xb78}}, 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x2, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000040)) 21:57:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000002c0)={0x53, 0x0, 0x6, 0x0, @buffer={0xd, 0x4, &(0x7f0000000040)=""/4}, &(0x7f0000000180)="3c1a016b527d", &(0x7f0000000240)=""/41, 0x0, 0x0, 0x0, &(0x7f0000000280)}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200000, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000340)=""/243) 21:57:56 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)={0x57, 0x80000001, 0x3, {0x2, 0x80000001}, {0x68e9b0d4, 0x8}, @ramp={0x0, 0x8, {0x51ed, 0x1, 0xffff, 0x2}}}) r1 = socket(0x10, 0x803, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000200)="2400710f000001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0xfffffffffffffeac) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x80, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000100)={0x0, 0x7ff, 0x1, &(0x7f00000000c0)=0x81}) dup2(r2, r2) close(r1) 21:57:56 executing program 5 (fault-call:2 fault-nth:37): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x399, &(0x7f0000002a40), 0x10000173, 0x0, 0x0, 0x4000}, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0xffffffff00000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_delroute={0x24, 0x19, 0x401, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff}, [@RTA_DST={0x8, 0x1, @dev={0xac, 0x14, 0x14}}]}, 0x24}, 0x1}, 0x0) [ 210.318537] FAULT_INJECTION: forcing a failure. [ 210.318537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 210.330501] CPU: 0 PID: 11254 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 210.337874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.347357] Call Trace: [ 210.349985] dump_stack+0x1c9/0x2b4 [ 210.353638] ? dump_stack_print_info.cold.2+0x52/0x52 [ 210.358856] should_fail.cold.4+0xa/0x1a [ 210.362949] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.368078] ? pcpu_balance_workfn+0x1700/0x1700 [ 210.372852] ? find_held_lock+0x36/0x1c0 [ 210.376951] ? check_same_owner+0x340/0x340 [ 210.382203] ? __lockdep_init_map+0x105/0x590 [ 210.386724] ? rcu_note_context_switch+0x730/0x730 [ 210.391657] __alloc_pages_nodemask+0x36e/0xdb0 [ 210.397098] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 210.402515] ? rcu_pm_notify+0xc0/0xc0 [ 210.406409] ? find_held_lock+0x36/0x1c0 [ 210.410465] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 210.416307] alloc_pages_current+0x10c/0x210 [ 210.420717] __get_free_pages+0xf/0x40 [ 210.424601] get_zeroed_page+0x11/0x20 [ 210.428477] mount_fs+0x210/0x328 [ 210.431919] ? mpi_free.cold.1+0x19/0x19 [ 210.435986] vfs_kern_mount.part.34+0xdc/0x4e0 [ 210.440572] ? may_umount+0xb0/0xb0 [ 210.444195] ? _raw_read_unlock+0x22/0x30 [ 210.448336] ? __get_fs_type+0x97/0xc0 [ 210.452221] do_mount+0x581/0x30e0 [ 210.455760] ? copy_mount_string+0x40/0x40 [ 210.459985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.464748] ? retint_kernel+0x10/0x10 [ 210.468638] ? copy_mount_options+0x1f0/0x380 [ 210.473125] ? copy_mount_options+0x202/0x380 [ 210.477609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.483307] ? copy_mount_options+0x285/0x380 [ 210.487795] ksys_mount+0x12d/0x140 [ 210.491411] __x64_sys_mount+0xbe/0x150 [ 210.495381] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 210.500388] do_syscall_64+0x1b9/0x820 [ 210.504261] ? finish_task_switch+0x1d3/0x870 [ 210.508745] ? syscall_return_slowpath+0x5e0/0x5e0 [ 210.513664] ? syscall_return_slowpath+0x31d/0x5e0 [ 210.518590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.524114] ? retint_user+0x18/0x18 [ 210.527823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.532658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.537839] RIP: 0033:0x4584aa [ 210.541012] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 210.560355] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 21:57:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) 21:57:56 executing program 7: r0 = syz_init_net_socket$llc(0x1a, 0x20000000005, 0x0) sendto$llc(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x3, 0xfffffffffffffffc, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) recvmmsg(r0, &(0x7f0000000f00)=[{{&(0x7f0000000180)=@hci, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/170, 0xaa}, {&(0x7f00000002c0)=""/244, 0xf4}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/218, 0xda}, {&(0x7f00000004c0)=""/159, 0x9f}], 0x5, &(0x7f0000000600)=""/173, 0xad, 0xb80}, 0x6}, {{&(0x7f00000006c0)=@nl=@unspec, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000740)=""/200, 0xc8}, {&(0x7f0000000100)=""/16, 0x1da}, {&(0x7f0000000840)=""/219, 0xdb}, {&(0x7f0000000940)=""/68, 0x44}], 0x4, &(0x7f0000000a00)=""/224, 0xe0, 0x7ff}, 0x5}, {{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000000e00), 0x7, &(0x7f0000000e80)=""/98, 0x62, 0x10001}, 0x8}], 0x3, 0x40002160, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40010200}, 0xfffffffffffffea1, &(0x7f00000000c0)={&(0x7f0000001240)={0x28, r2, 0x708, 0x70bd2c, 0x25dfdbfe, {0x2}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) readv(r0, &(0x7f0000001200)=[{&(0x7f0000000fc0)=""/255, 0xff}, {&(0x7f00000010c0)=""/158, 0x9e}, {&(0x7f0000001180)=""/66, 0x42}], 0x3) 21:57:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0xac140, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = memfd_create(&(0x7f0000000140)=':em1{systemmd5sumcgroup\x00', 0x0) fsetxattr(r1, &(0x7f0000000000)=@known='trusted.syz\x00', &(0x7f0000000040)='md5sum!^(*-,\x00', 0xd, 0x0) close(r1) [ 210.568064] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 210.575429] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 210.582694] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 210.589951] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 210.597314] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000025 21:57:57 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = memfd_create(&(0x7f0000000040)='aead\x00', 0x2) write$eventfd(r1, &(0x7f0000000080), 0x8) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f00000000c0)="af494129a3e4f57ad4949cf2c90bbf551a", 0x11) io_setup(0x800000100000005, &(0x7f0000f69000)=0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f000007d000)="b3", 0x1}]) write(r3, &(0x7f0000000100)="7cd7f850ebdb252f724a9c38d8197df19fe356210b943c3f89f8d53226bbccca0300c3217e60f0a505ca907b5e71d35ceb35557aa0f481c600d8d0f00dcd57d1c724459390f0b46086c6abb46a464b429321d141386017927b23e89298195cd3edeb98a88e914245071a24536081483e4bea76ece2d630c0222458946ba56509446629082d394c102c91008635053754f8a6dbbda9991efdae6c7e530251dcd4308d7c6883c6d4eaf48b34e082883e16", 0xb0) 21:57:57 executing program 0: syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x7a00, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='errors=recover,umask=00000000000000000000000,umask=00000000000000000000000,errors=continue,case_sensitive=yes,mft_zone_multiplier=0x0000000000000000,show_sys_files=yes,umask=00000000000000000010000,dmask=000000000000,\x00']) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@empty, @multicast1, 0x0}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000004c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004000)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000004100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @loopback, @multicast1}, &(0x7f0000004180)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004440)={&(0x7f00000041c0)={0x258, r1, 0x700, 0x70bd2c, 0x25dfdbfb, {0x1}, [{{0x8, 0x1, r2}, {0xb8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r3}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x17c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6b1175b1}}, {0x8, 0x6, r7}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}, {0x8, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r9}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x258}, 0x1}, 0x8001) 21:57:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000000)=ANY=[@ANYBLOB="94142d7f40df141494b27b2bab910fae"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x10000000000000a3) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000140)={0x58, "b5ab1db76f5226c082ff95f11164a4c2209ba89eb8a149af3e62ae6b2e319b8f103f332f75ad57411896749e0b821849b57d2155a9f698d51c01e40d91b59b053fa0541272182032a59d127b480702bacc2aca982f5787e7"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x401) 21:57:57 executing program 5 (fault-call:2 fault-nth:38): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:57 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x4, 0x1}, 0x0) poll(&(0x7f00000000c0), 0x0, 0xffff) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x2a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000080)) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00'}, 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x7, 0x30, 0x101, 0x4}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000180)={r3, 0x2, 0x26, "4c18c307c622b6c5a2df8930ec0e50d1aa5635afca7a03e93f8eecbc05fe9beaf567ef5fbaeb"}, 0x2e) 21:57:57 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) keyctl$join(0x1, &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-serpent-sse2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="649c47ad", 0x4) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x800000100000005, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 21:57:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@setlink={0x28, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_CARRIER={0x8, 0x21}]}, 0x28}, 0x1}, 0x0) getsockopt(r0, 0x1, 0x8, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) [ 210.888470] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 210.898093] FAULT_INJECTION: forcing a failure. [ 210.898093] name failslab, interval 1, probability 0, space 0, times 0 [ 210.909435] CPU: 0 PID: 11293 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 210.916812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.926295] Call Trace: [ 210.928923] dump_stack+0x1c9/0x2b4 [ 210.932594] ? dump_stack_print_info.cold.2+0x52/0x52 21:57:57 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100, 0x800) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f00000000c0)=""/182, &(0x7f0000000180)=0xb6) r2 = dup(r1) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7fffffff) [ 210.937815] ? kernel_text_address+0x79/0xf0 [ 210.942253] should_fail.cold.4+0xa/0x1a [ 210.946340] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.951499] ? save_stack+0x43/0xd0 [ 210.955146] ? kasan_kmalloc+0xc4/0xe0 [ 210.959045] ? kasan_slab_alloc+0x12/0x20 [ 210.961857] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 210.963206] ? kmem_cache_alloc+0x12e/0x760 [ 210.963224] ? alloc_vfsmnt+0xe8/0x9f0 [ 210.963247] ? find_held_lock+0x36/0x1c0 [ 210.963284] ? check_same_owner+0x340/0x340 [ 210.980271] netlink: 'syz-executor1': attribute type 33 has an invalid length. [ 210.982867] ? rcu_note_context_switch+0x730/0x730 [ 210.982892] __should_failslab+0x124/0x180 [ 210.982919] should_failslab+0x9/0x14 [ 211.007510] __kmalloc_track_caller+0x2c4/0x760 [ 211.012307] ? kasan_check_read+0x11/0x20 [ 211.016614] ? do_raw_spin_unlock+0xa7/0x2f0 [ 211.021064] ? kstrdup_const+0x66/0x80 [ 211.024976] kstrdup+0x39/0x70 [ 211.028197] kstrdup_const+0x66/0x80 [ 211.031980] alloc_vfsmnt+0x1bb/0x9f0 [ 211.035788] ? mnt_free_id.isra.27+0x60/0x60 [ 211.040215] ? graph_lock+0x170/0x170 [ 211.044303] ? rcu_pm_notify+0xc0/0xc0 [ 211.048222] ? find_held_lock+0x36/0x1c0 [ 211.052305] ? lock_downgrade+0x8f0/0x8f0 [ 211.056464] ? module_unload_free+0x5d0/0x5d0 [ 211.060980] vfs_kern_mount.part.34+0x90/0x4e0 [ 211.065570] ? may_umount+0xb0/0xb0 [ 211.069204] ? _raw_read_unlock+0x22/0x30 [ 211.073356] ? __get_fs_type+0x97/0xc0 [ 211.077254] do_mount+0x581/0x30e0 [ 211.080796] ? do_raw_spin_unlock+0xa7/0x2f0 [ 211.085210] ? copy_mount_string+0x40/0x40 [ 211.089454] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.094342] ? retint_kernel+0x10/0x10 [ 211.098240] ? copy_mount_options+0x213/0x380 [ 211.102743] ? copy_mount_options+0x19c/0x380 [ 211.107254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.112816] ? copy_mount_options+0x285/0x380 [ 211.117332] ksys_mount+0x12d/0x140 [ 211.120971] __x64_sys_mount+0xbe/0x150 [ 211.124948] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 211.129973] do_syscall_64+0x1b9/0x820 [ 211.133864] ? syscall_slow_exit_work+0x500/0x500 [ 211.138983] ? syscall_return_slowpath+0x5e0/0x5e0 [ 211.143920] ? syscall_return_slowpath+0x31d/0x5e0 [ 211.148875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.154421] ? retint_user+0x18/0x18 [ 211.158144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.163004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.168196] RIP: 0033:0x4584aa [ 211.171381] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 211.190890] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 211.198634] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 211.206016] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 211.213296] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 211.220569] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 211.227901] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000026 21:57:57 executing program 1: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "1fa81bdfc5693eaacc403eec0ebb14069da82c46b9813b79a6bb872e811c474e9e1f68d7e3ad316b235a8651"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e7ad6a30f0efb3a8f2f1256dcb0c09c578524021857b879d300ee8a096c658540ed7e3898814aeaed1611e728d6809376f03ff0306b84c23a50bca46a74d3c2d", &(0x7f000000cff7), 0x9, [], [0x8]}) r0 = syz_open_dev$sndctrl(&(0x7f0000012000)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@sco, &(0x7f00000000c0)=0x80) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) [ 211.237712] netlink: 'syz-executor1': attribute type 33 has an invalid length. 21:57:57 executing program 5 (fault-call:2 fault-nth:39): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:57 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockname(r0, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80) r1 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x3689, 0x400) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0x57, "c51ba159f46b0781860112d333017b03b7f12ae65639ecfd96ff35310c1c77570485e3c18f2544120dad9ba30ab0ca08bf5c67e6b8ae14c17d629abbb47744fa9b473312b64be7e81ae353bfb058c4b6be01b44ea1e43a"}, &(0x7f0000000300)=0x5f) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={r2, 0x2, 0x1, [0x5e3]}, &(0x7f0000000380)=0xa) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xffffffffffff9af1, 0x20000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="0300000000000000"], &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r4, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r5, 0x100020000000}, 0x8) 21:57:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0xfffffffffffffffd) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) write$P9_RVERSION(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000100000"], 0x15) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000540)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x100000001}, 0x2c}, {@cachetag={'cachetag', 0x3d, 'trans=fd,'}, 0x2c}]}}) r3 = add_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="8e7a8137a0618b3dd4e3bbf38f819ea9cb5de6354be3e5c6780747ed74783fd796fb528f7e922bd3c7e3b22e7889163b45e3b38a082bf4cfc72d91c101b8d19205536908370be60efdcf32552924225ef4c0354d2c46a17afbea4276991c194fd3e3b01dfbfa86480c", 0x69, 0xffffffffffffffff) keyctl$set_timeout(0xf, r3, 0x1) mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='romfs\x00', 0x210051, 0x0) 21:57:57 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x41, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/201) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x1) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000180)) [ 211.362475] FAULT_INJECTION: forcing a failure. [ 211.362475] name failslab, interval 1, probability 0, space 0, times 0 [ 211.373794] CPU: 0 PID: 11331 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 211.382149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.391509] Call Trace: [ 211.394119] dump_stack+0x1c9/0x2b4 [ 211.398638] ? dump_stack_print_info.cold.2+0x52/0x52 [ 211.403860] should_fail.cold.4+0xa/0x1a [ 211.407940] ? should_fail+0x223/0xbed [ 211.411853] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 211.417567] ? pcpu_balance_workfn+0x1700/0x1700 [ 211.422351] ? find_held_lock+0x36/0x1c0 [ 211.426449] ? check_same_owner+0x340/0x340 [ 211.431374] ? rcu_note_context_switch+0x730/0x730 [ 211.436457] __should_failslab+0x124/0x180 [ 211.440714] should_failslab+0x9/0x14 [ 211.444624] kmem_cache_alloc+0x2af/0x760 [ 211.448784] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 211.453821] getname_kernel+0x54/0x370 [ 211.457742] kern_path+0x1e/0x40 [ 211.461124] lookup_bdev+0x10c/0x250 [ 211.464855] ? blkdev_open+0x280/0x280 [ 211.468762] ? find_held_lock+0x36/0x1c0 [ 211.473012] blkdev_get_by_path+0x1f/0xe0 [ 211.477178] mount_bdev+0x5d/0x3e0 [ 211.480738] ? jfs_destroy_inode+0x310/0x310 [ 211.485164] jfs_do_mount+0x34/0x40 [ 211.488804] mount_fs+0xae/0x328 [ 211.492191] vfs_kern_mount.part.34+0xdc/0x4e0 [ 211.496784] ? may_umount+0xb0/0xb0 [ 211.500432] ? _raw_read_unlock+0x22/0x30 [ 211.504598] ? __get_fs_type+0x97/0xc0 [ 211.508504] do_mount+0x581/0x30e0 [ 211.512060] ? copy_mount_string+0x40/0x40 [ 211.516427] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.521209] ? retint_kernel+0x10/0x10 [ 211.525139] ? copy_mount_options+0x1f0/0x380 [ 211.529648] ? copy_mount_options+0x1fa/0x380 [ 211.534158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.539716] ? copy_mount_options+0x285/0x380 [ 211.544235] ksys_mount+0x12d/0x140 [ 211.547962] __x64_sys_mount+0xbe/0x150 [ 211.551948] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 211.556974] do_syscall_64+0x1b9/0x820 [ 211.560868] ? finish_task_switch+0x1d3/0x870 [ 211.565555] ? syscall_return_slowpath+0x5e0/0x5e0 [ 211.570502] ? syscall_return_slowpath+0x31d/0x5e0 [ 211.575444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.581082] ? retint_user+0x18/0x18 [ 211.584809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.589664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.594866] RIP: 0033:0x4584aa [ 211.598053] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 211.617596] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 211.625309] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 211.632573] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 211.639840] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 211.647096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 211.654353] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000027 21:57:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) 21:57:57 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) io_setup(0x0, &(0x7f00000000c0)) r2 = memfd_create(&(0x7f0000000340)='veth0_to_team\x00', 0x2) futex(&(0x7f0000000300)=0x1, 0x4, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, &(0x7f0000000400)=0x1, 0x0) io_submit(0x0, 0x2, &(0x7f0000000640)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)="6548bb423541", 0x6}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffffffffffffffff, &(0x7f00000003c0)}]) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000280)={0x20, 0x7, 0x2, 0x8, 0x9}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x7a) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) getgroups(0x3, &(0x7f0000000100)=[0xffffffffffffffff, 0xee00, 0xee01]) fstat(r1, &(0x7f0000000140)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setresgid(r3, r4, r5) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 21:57:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xbef7, 0x80400) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000001c40)={&(0x7f0000000580)=ANY=[@ANYBLOB="4c0000001f00c3af00000000000000007f0000010000000000000000000000000000800000000000fe8000000000000000000000000000aa00000000000000000c0015000000000000000000"], 0xe0}, 0x1}, 0x0) 21:57:57 executing program 6: openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="295ed277a4200100360070") r1 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000340)='memory.swap.max\x00', 0x2, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x4000) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000140)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000800)="2fdc4fe5a3fa07060f6e239891eb7afdefead19a7cc85f8da1a8ce02144838b5cd88ef343a782fb58d2066f70bec34e5062b0c20b1dc5afa5e0a8587f2773eea0cd99b8fbeb835db1897f6b3364893d295a09c7793df94bde94885cac156d3abf86548c920fc20845bb966708dc0f87ba04c1efd8361eb2bcf4b003a60d5d0e1d9c0ca104850528256d1485ccb41b17fe917ff0d39d7dc1827c8d87dfe379b9b6d9d78edec48a41c50e70c51f8080d27948e2b70da27256618130ffc246e4f33ba474fac31017ef4be1ebaadd6747cc743e754c161c8d85f07788993dec4e32990baf7c8a86e2186b39c62586afe4cb5f6e99975a3e02cb9000d69fbc223a4b90d6a2f20d1e1a5f035826407240734bc0611d23b3eb7c252b3faf2380647aa3b99d884b3929e6cc9e7708768804ab1ed42ce307c17cf525228bac2052a866ae4e7a826b5d0cfccb33933b6130b541a0700dfcc812b8c0495ebff20477d38c66133c6c30b1cab90d0f44d218149ebf5bc26d5a8b1c9cd9867191776c7ea597b6bfee96800389490b3bf83ff36924abf3590b5f9759e933e0f274be8efadb919720fdcd1dc1dd456c3c1d0284b396cf7581f5db10d09904945a50f835a748788b2ee2a69db9a9df26c8b3901d8c5599b7375d129e48fac4afb03be74604c213fd73f615c3b90c2daab799e854be128ff1993e7aeb0aa888ba353d1b2b2fe714319bf13ec10e249924d6e4cbecec914c0812691f6677e81e5442408aeb1b3f92c7cc87aef2d7cf434aa5d5c55ec7cb4161e055988e08e91e8bc579711eacd8171eaf7174a4d61ba46b0291e88ad871c7994a1889a8440d53c4bb8870f7cb7b1", 0x25e, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r4, r4}, &(0x7f0000000180)=""/4, 0x4, &(0x7f0000000400)={&(0x7f0000000380)={'crc32c\x00'}, &(0x7f00000003c0)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) 21:57:57 executing program 5 (fault-call:2 fault-nth:40): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:57:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000380)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000040)='./file0\x00', 0x400401, 0x0) set_mempolicy(0x2, &(0x7f0000000140)=0x100005, 0x6) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 21:57:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000440)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0xcd81, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000500)={0x12, 0x10, 0xfa00, {&(0x7f00000002c0), r1, r2}}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7, 0x205, &(0x7f0000000340)=""/167}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x5, &(0x7f0000000400)=@framed={{0x18, 0x6}, [@jmp={0x10, 0x0, 0x4}], {0x95}}, &(0x7f0000000700)="78e2bc729ea8476e2ced739aa4ea9f74a2bbb28910c02320e27a207ed8e8a5d0a63a4c0fbc5718766d362b5cc753ed19e26c294580fe72e17323d2e6a16fbe87c076349f279af5b879ef4f402b49844da6919c45e9731904a59198f84b33ca50f5bd1a1d0379172a0528053340603a34d74239ccd824aeee66acbabf331b2ece9487e22cb736ced6c725b493b0828701", 0xc, 0xa8, &(0x7f00000007c0)=""/168}, 0x47) [ 211.833285] FAULT_INJECTION: forcing a failure. [ 211.833285] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 211.845150] CPU: 1 PID: 11367 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 211.852521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.861884] Call Trace: [ 211.864487] dump_stack+0x1c9/0x2b4 [ 211.868121] ? dump_stack_print_info.cold.2+0x52/0x52 [ 211.873330] should_fail.cold.4+0xa/0x1a [ 211.877403] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 211.882524] ? trace_hardirqs_on+0x10/0x10 [ 211.886769] ? wait_for_completion+0x8d0/0x8d0 [ 211.891359] ? lock_downgrade+0x8f0/0x8f0 [ 211.895510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.901060] ? find_next_zero_bit+0x111/0x140 [ 211.905566] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 211.910417] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 211.915272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.920812] ? should_fail+0x223/0xbed [ 211.924798] __alloc_pages_nodemask+0x36e/0xdb0 [ 211.929484] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 211.934511] ? find_held_lock+0x36/0x1c0 [ 211.938613] ? check_same_owner+0x340/0x340 [ 211.942942] cache_grow_begin+0x91/0x710 [ 211.947019] kmem_cache_alloc+0x689/0x760 [ 211.951185] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 211.956213] getname_kernel+0x54/0x370 [ 211.960105] kern_path+0x1e/0x40 [ 211.963474] lookup_bdev+0x10c/0x250 [ 211.967206] ? blkdev_open+0x280/0x280 [ 211.971099] ? find_held_lock+0x36/0x1c0 [ 211.975187] blkdev_get_by_path+0x1f/0xe0 [ 211.979343] mount_bdev+0x5d/0x3e0 [ 211.982884] ? jfs_destroy_inode+0x310/0x310 [ 211.987298] jfs_do_mount+0x34/0x40 [ 211.990942] mount_fs+0xae/0x328 [ 211.994322] vfs_kern_mount.part.34+0xdc/0x4e0 [ 211.998911] ? may_umount+0xb0/0xb0 [ 212.002556] ? _raw_read_unlock+0x22/0x30 [ 212.006707] ? __get_fs_type+0x97/0xc0 [ 212.010604] do_mount+0x581/0x30e0 [ 212.014158] ? copy_mount_string+0x40/0x40 [ 212.018397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 212.023156] ? retint_kernel+0x10/0x10 [ 212.027056] ? copy_mount_options+0x1f0/0x380 [ 212.031553] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 212.036398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.041931] ? copy_mount_options+0x285/0x380 [ 212.046701] ksys_mount+0x12d/0x140 [ 212.050330] __x64_sys_mount+0xbe/0x150 [ 212.054306] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 212.059326] do_syscall_64+0x1b9/0x820 [ 212.063210] ? finish_task_switch+0x1d3/0x870 [ 212.067703] ? syscall_return_slowpath+0x5e0/0x5e0 [ 212.072632] ? syscall_return_slowpath+0x31d/0x5e0 [ 212.077564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.083125] ? retint_user+0x18/0x18 [ 212.086841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.091692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.096890] RIP: 0033:0x4584aa [ 212.100073] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 212.119656] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 21:57:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x101, 0x9, 0x0, 0x9, 0x1, 0x3, 0x3f, 0x4, 0x8b, 0x38, 0x26e, 0x1, 0x8, 0x20, 0x1, 0x2, 0x3, 0x9}, [{0x0, 0x793, 0x7f, 0x80, 0x1f, 0xfffffffffffffff9, 0x3, 0xffffffff}, {0x5, 0xbea6, 0x5, 0x1, 0x1, 0xf8, 0x7fff, 0x3}], "d126920b44889ed67419f7ceb42907909ed6b59125e75e52fd4077fb8b9bde9cb1b3fe66"}, 0x9c) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000000c0)=ANY=[]) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0xfffffffffffffd1c, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfffffcbf) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000200000000000000005"]) ioctl$fiemap(r2, 0x6609, &(0x7f0000000140)=ANY=[]) 21:57:58 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffffffffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6, 0x2000) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000140)=0x2, 0x4) r3 = accept4$unix(r2, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x800) prlimit64(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000180)=0x0) write$P9_RGETLOCK(r2, &(0x7f00000001c0)={0x28, 0x37, 0x2, {0x2, 0x7f, 0x3, r4, 0xa, '/dev/dsp#\x00'}}, 0x28) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000002c0)={r2, 0x3, 0x80000000, r2}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_int(r5, 0x1, 0x2e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 212.129224] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 212.136496] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 212.144036] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 212.151305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 212.158572] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000028 21:57:58 executing program 7: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) vmsplice(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1c, &(0x7f000095dff8), &(0x7f00000000c0)=0x4) 21:57:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0x96bb000000000008}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="4c0000002200010000000000000000000400000038001100b9dfe5ef7bb3bdfe15e441cbe61a6f4a3acf2994d32ec165e90dc316f3a90fcfa9cdae85552f000000"], 0x4c}, 0x1}, 0x0) clock_getres(0x2, &(0x7f0000000000)) 21:57:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RCREATE(r0, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x50, 0x3, 0x4}, 0x3}}, 0x18) recvmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000440)=""/140, 0x8c}, {&(0x7f0000000500)=""/218, 0xda}, {&(0x7f0000000600)=""/175, 0xaf}, {&(0x7f00000006c0)=""/75, 0x4b}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/218, 0xda}], 0x6}}, {{&(0x7f0000000900)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000a40)}}], 0x2, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000001400)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000013c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000d8000000000000"], 0x14}, 0x1}, 0x0) recvmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000b00)=""/84, 0x54}, 0x4}], 0x0, 0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x989680}) 21:57:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x9dd2, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x1c) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000003c0)=0x3, 0x4) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x33, 0x4000) getsockopt$sock_buf(r2, 0x1, 0x0, &(0x7f00000002c0)=""/201, &(0x7f0000000200)=0xc9) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r3, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)="ddc207b27be75da97d95920d4c1301c98524a1ee3e01b1476383953a0c467d51543f41b4c9514e1a0a362c67b012fb901af55a6435428ec1c388eaea1295e3a2b92725d7ebb679a6ee1cf0744291", 0x4e) futex(&(0x7f0000000100), 0x5, 0x0, &(0x7f00000000c0), &(0x7f0000000180), 0x0) 21:57:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) prctl$void(0x3e) sendmsg$alg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000380)={&(0x7f00000003c0)=@ethernet, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/170, 0xaa}], 0x1, &(0x7f0000000240)=""/148, 0x94}, 0x0) [ 212.412503] sysfs: cannot create duplicate filename '/class/ieee80211/¹ßåï{³½þäAËæoJ:Ï)”Ó.Áeé Ãó©Ï©Í®…U!' [ 212.424472] CPU: 0 PID: 11394 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 212.432992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.443449] Call Trace: [ 212.446100] dump_stack+0x1c9/0x2b4 [ 212.450936] ? dump_stack_print_info.cold.2+0x52/0x52 [ 212.456759] ? trace_hardirqs_on+0xd/0x10 [ 212.461032] sysfs_warn_dup.cold.3+0x1c/0x2b [ 212.465458] sysfs_do_create_link_sd.isra.2+0x116/0x130 [ 212.470843] sysfs_create_link+0x65/0xc0 [ 212.474918] device_add+0x5c9/0x16f0 [ 212.478646] ? ___sys_sendmsg+0x7fd/0x930 [ 212.482806] ? __sys_sendmsg+0x11d/0x290 [ 212.486882] ? device_private_init+0x240/0x240 [ 212.491517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.497080] wiphy_register+0x1858/0x2510 [ 212.501685] ? wiphy_unregister+0x12c0/0x12c0 [ 212.506324] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.511347] ? __kmalloc+0x5f9/0x760 [ 212.515074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.520625] ? ieee80211_cs_list_valid+0x7c/0x440 [ 212.525493] ? ieee80211_register_hw+0xc13/0x35e0 [ 212.530352] ieee80211_register_hw+0x13d5/0x35e0 [ 212.535121] ? rcu_is_watching+0x61/0x150 [ 212.539276] ? ieee80211_free_ack_frame+0x60/0x60 [ 212.544138] mac80211_hwsim_new_radio+0x1db8/0x33b0 [ 212.549179] ? __rhashtable_insert_fast.constprop.53+0xf90/0xf90 [ 212.555340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.560893] ? vsnprintf+0x20d/0x1b60 [ 212.564718] ? pointer+0x950/0x950 [ 212.568279] ? rcu_note_context_switch+0x730/0x730 [ 212.573239] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 212.578270] ? kvasprintf+0xea/0x140 [ 212.581996] ? bust_spinlocks+0xe0/0xe0 [ 212.585989] ? kasprintf+0xab/0xe0 [ 212.589539] ? kvasprintf_const+0x190/0x190 [ 212.593866] ? graph_lock+0x170/0x170 [ 212.597705] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 212.602935] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 212.608488] hwsim_new_radio_nl+0x7c0/0xa80 [ 212.612815] ? nla_parse+0x32b/0x4b0 [ 212.616537] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 212.621739] ? __netlink_ns_capable+0x100/0x130 [ 212.626510] genl_family_rcv_msg+0x8a3/0x1140 [ 212.631019] ? genl_unregister_family+0x8b0/0x8b0 [ 212.635867] ? lock_downgrade+0x8f0/0x8f0 [ 212.640017] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 212.645062] ? kasan_check_read+0x11/0x20 [ 212.649218] ? lock_acquire+0x1e4/0x540 [ 212.653200] ? genl_rcv+0x19/0x40 [ 212.656675] genl_rcv_msg+0xc6/0x168 [ 212.660397] netlink_rcv_skb+0x172/0x440 [ 212.664554] ? genl_family_rcv_msg+0x1140/0x1140 [ 212.669312] ? netlink_ack+0xbe0/0xbe0 [ 212.673206] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 212.677622] genl_rcv+0x28/0x40 [ 212.680929] netlink_unicast+0x5a0/0x760 [ 212.685015] ? netlink_attachskb+0x9a0/0x9a0 [ 212.689434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.694984] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 212.700008] netlink_sendmsg+0xa18/0xfd0 [ 212.704079] ? netlink_unicast+0x760/0x760 [ 212.708328] ? move_addr_to_kernel.part.20+0x100/0x100 21:57:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[], 0x0) [ 212.713617] ? security_socket_sendmsg+0x94/0xc0 [ 212.718380] ? netlink_unicast+0x760/0x760 [ 212.723299] sock_sendmsg+0xd5/0x120 [ 212.727196] ___sys_sendmsg+0x7fd/0x930 [ 212.731184] ? copy_msghdr_from_user+0x580/0x580 [ 212.735947] ? rcu_is_watching+0x8c/0x150 [ 212.741129] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 212.745542] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 212.750741] ? __fget_light+0x2f7/0x440 [ 212.754717] ? fget_raw+0x20/0x20 [ 212.758175] ? expand_files.part.8+0x9c0/0x9c0 21:57:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="8500000006ffff0096e548bc703d80b59108cca2c5550000"], &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) r1 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000000240)={0x2, 0x0, 0x5, 0x5c, r1}) 21:57:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x44000, 0x0) acct(&(0x7f0000000000)='./file0\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 212.762760] ? __fd_install+0x2db/0x880 [ 212.766743] ? dlci_ioctl_set+0x40/0x40 [ 212.770745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.776311] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.782189] ? sockfd_lookup_light+0xc5/0x160 [ 212.782261] __sys_sendmsg+0x11d/0x290 21:57:59 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x8, 0x200000000000001b, 0x0, 0x0, 0x0, [@sadb_key={0x17, 0x9, 0x558, 0x0, "73079e0674f4f9ffddf0a46655868e1168e548d9e3bfc68ef945855841a6fd1980e12e84453f09d2574132ab801d6f6447465f196d05aae821d77467dd833663f56ac2037690ac9ac1b39a70707758c64b8d18a82114c8a28ec43658aae6d2a878ae9e3c5ca928314dcb07a8ba336171975128dc0bfbfc28faf6be5338e67c0c1b4e45ae76caa40a54e8750f9a52ee74fdf6c8597d29b1c4a1dda37a07c82a33bd9964515f2782ac070348"}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0xf0}, 0x1}, 0x0) socket$key(0xf, 0x3, 0x2) 21:57:59 executing program 1: r0 = socket$inet6(0xa, 0x800, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118) [ 212.782280] ? __ia32_sys_shutdown+0x80/0x80 [ 212.782301] ? __x64_sys_futex+0x47f/0x6a0 [ 212.782319] ? exit_to_usermode_loop+0x8c/0x370 [ 212.782346] ? ksys_ioctl+0x81/0xd0 [ 212.782368] __x64_sys_sendmsg+0x78/0xb0 [ 212.782386] do_syscall_64+0x1b9/0x820 [ 212.782401] ? finish_task_switch+0x1d3/0x870 [ 212.782418] ? syscall_return_slowpath+0x5e0/0x5e0 [ 212.782436] ? syscall_return_slowpath+0x31d/0x5e0 [ 212.782466] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 212.782488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.782515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.782527] RIP: 0033:0x455a79 [ 212.782531] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.782813] RSP: 002b:00007f02e9434c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.782829] RAX: ffffffffffffffda RBX: 00007f02e94356d4 RCX: 0000000000455a79 [ 212.782838] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000016 [ 212.782847] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 212.782856] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 212.782865] R13: 00000000004c1080 R14: 00000000004d1718 R15: 0000000000000000 [ 212.914502] jfs: Unrecognized mount option "u" or missing value [ 213.456691] syz-executor3 (11431) used greatest stack depth: 13064 bytes left 21:58:02 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(seed)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = dup(r0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0c000700a800d0315f523f58328c39f5e034c273b7f2e9c39c9aa0783f02e5b8b892c6f1156b04a0684dfa44c03a950cfc1443762109650f185dba70bb4aa812df3becb01cd339acc8df20e5ed7a31eaa89316784e8c92aa2488011bab85489e53ec7768f2", @ANYRES16=r4, @ANYBLOB="200626bd7000fcdbdf2505000000080006000100000008000500040000000800050003000000180003001400020064756d6d7930000000000000000000000800050004000000"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x8004) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) msgget$private(0x0, 0x20) 21:58:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='net/ip_vs_stats_percpu\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x5, 0x8, 0x1f, 0x80000001, 0x26}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2, 0x401}, &(0x7f0000000580)=0x8) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {r1, 0xe3, "893fda", "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"}}, 0x110) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000600)={0x12, 0x10, 0xfa00, {&(0x7f00000005c0), r1, r0}}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x6, 0x0, "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", 0xbb}}}, 0x120) 21:58:02 executing program 1: mlock2(&(0x7f0000570000/0x2000)=nil, 0x2000, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mremap(&(0x7f000004f000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x7, @empty, 0x81}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={r1, 0x1}, &(0x7f0000000300)=0x8) mmap(&(0x7f000004f000/0x2000)=nil, 0x2000, 0x2, 0x13, r0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000040)=""/90) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000340)=@assoc_value={r1, 0x5}, 0x8) accept4$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x7fffe) 21:58:02 executing program 5 (fault-call:2 fault-nth:41): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_emit_ethernet(0x42, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaff953462a55586dd60dcd50f000c0000fe80000000000000c0000e00000000aafe8000000000000000000000000000aa81009078000800003a4a7715"], &(0x7f0000000340)) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 21:58:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x7, 0x20000000008, 0x3}, 0x2c8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="011403000000000000000000000000000000ffffe0000002fe8000000000000000000000000000aafe8000000000000000000000000000bbfe800000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000000fe8062b6082f42e2783315000000000000000000000000001aff02000000000000000000000000000100000000000000000000ffffac1414bb00000000"], 0xa8) 21:58:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x149300, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400), &(0x7f0000000540)=0x3b4) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa500) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000240)) sendmsg$nl_xfrm(r3, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="f800000016001d0300a1b600000000000000000000000000000000000000000000000000000000000000ffffe000000200000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000003300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0f0000"], 0xf8}, 0x1}, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000180)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f00000002c0), 0x4) 21:58:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[], 0x0) 21:58:02 executing program 7: futex(&(0x7f0000000000), 0x80000000000c, 0x0, &(0x7f0000edfff0), &(0x7f0000048000), 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000dac000)={0x77359400}, &(0x7f0000048000), 0x0) [ 216.149219] FAULT_INJECTION: forcing a failure. [ 216.149219] name failslab, interval 1, probability 0, space 0, times 0 [ 216.160911] CPU: 0 PID: 11459 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 216.168280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.177751] Call Trace: [ 216.180463] dump_stack+0x1c9/0x2b4 [ 216.184149] ? dump_stack_print_info.cold.2+0x52/0x52 [ 216.189390] ? mutex_trylock+0x2b0/0x2b0 [ 216.193469] ? mutex_trylock+0x2b0/0x2b0 [ 216.197553] should_fail.cold.4+0xa/0x1a [ 216.201637] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.206760] ? lock_acquire+0x1e4/0x540 [ 216.210757] ? graph_lock+0x170/0x170 [ 216.214581] ? find_held_lock+0x36/0x1c0 [ 216.218760] ? __lock_is_held+0xb5/0x140 [ 216.222856] ? check_same_owner+0x340/0x340 [ 216.227200] ? rcu_note_context_switch+0x730/0x730 [ 216.232165] __should_failslab+0x124/0x180 [ 216.236417] should_failslab+0x9/0x14 [ 216.240231] kmem_cache_alloc_trace+0x2cb/0x780 [ 216.244935] ? kasan_check_write+0x14/0x20 21:58:02 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', '\'}-mime_typenodev\x00'}, &(0x7f00000000c0)=""/117, 0x75) [ 216.249179] ? do_raw_spin_lock+0xc1/0x200 [ 216.253437] sget_userns+0x1cf/0xf20 [ 216.257168] ? kill_litter_super+0x90/0x90 [ 216.261417] ? ns_test_super+0x50/0x50 [ 216.265319] ? destroy_unused_super.part.11+0x110/0x110 [ 216.270694] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 216.275301] ? kasan_check_write+0x14/0x20 [ 216.279702] ? do_raw_spin_lock+0xc1/0x200 [ 216.283966] ? blkdev_get+0xc8/0xb50 [ 216.287714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.293269] ? cap_capable+0x1f9/0x260 21:58:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x8100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000001c0)="f2ad0f320f09648739b9300a0000b86cd20000ba000000000f300f0085001000000f060f08f614b10f01cb", 0x2b}], 0x1, 0x0, &(0x7f00000002c0), 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x400, 0x7, &(0x7f0000000700)=[{&(0x7f00000002c0)="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", 0xfb, 0x3}, {&(0x7f00000000c0)="3996147744478951a38ac52820363226147d07b74b3fc2b49740b4e1468789c558951196536fe961a2d73f4ae82d11c7cf6e6827b8b3da3e1af035e0f51f3272530c3da938844bd756b95991ab554b66578500fdb6cd6eca0812e42e1eceb0f54bba44527f94d33af13f2f0c8720938f1611f5fecae43f6aad2d8c51f9d0262f433ba08e68", 0x85, 0x3e4f}, {&(0x7f00000003c0)="dd8f0c47abbc81c813f8bb0e59b4996e1cd54ae4f890f7318b0ae2514525f2417daa833929252ae0da2bf52ca0674be0daf6b5467e7802094181f74100a36b8e844061060128eef016de4fc6d773e87fb20a479995c15463c5d556d0fafe7813cb55d19946b66f219ff5af7e1b67c8e436b69cfe46d32a78e2011219e103750fab9b93b5e8733bbafffa61ea83669fc8146ef7417943ae9a119f148fb87b811246a968f67ea7810448b6223ae685ab2e2159a317b57c2749377bba4fbd748c9f2d4bf82fac3ba5a672fcf4c7968ea62af422e7732d4e56647674cfe31eaeca6dfe85afbf036246b8", 0xe8, 0x8}, {&(0x7f00000004c0)="b80bb83bcd8d272377f664fdc8d53f1be61fb6c42525d336e9ca41c6db0b468e0ba4a76213c1a04d8efd1d725c95a5f8ff82b98588d4e33e849f9ee41b35012082a365d8fc9bd01f0d83e70287b98667313477ec10b1b3c27fded24fee387c3eab1cdca2358a63d7775cfaca7afa673c3479fb077740cb08affab547a25fe25844111fa436a5c3a24b05f0bfad0ee918ac8dfcba6ea3b694535231b249d27411a7c2f89d2af0cb07e2c4dc76c152833a8d8f64969b021df237c9e35f56c1c924a3389e785712baba395338fd8d", 0xcd, 0xa7}, {&(0x7f00000005c0)="120be9d0726ca0d453c45a7412d8c4607074f4c4f749fdc21de7cdc1cc3f712a9ebf6c100bfcb628b12aa53890c593974512724ba85b2038f5bb0cde80db26", 0x3f, 0x7dd4}, {&(0x7f0000000600)="cb5f4e5873c302ce5d5782c121fa206db69bd971fc2d6210776dbc58062f568ab374a9f4cd73c9db537812bf90dd1328bc22b312b977cdfa66b55f7730158fd8b3568d6178b28d9e19ac6ba9b8c8227d1b792788ace8eae046e4a08b54b6d9d3ae01ab504f45ec6fd1c3393a059899e784d599c2bca3dd60caed832630e6eb4e7535f98784b201ec1bb99d95d329f44976dfa02b0359a42b19b9f7f9a22c3c98c56cba3f99ab3030", 0xa8, 0x5}, {&(0x7f00000006c0)="2f50c042386f8d6f119dc92adbd848e77ca9d32c705916da0b86e63561b2737fb9b556396920ad6b7a48e4afaec4f2abe745848795d53b36b2a3", 0x3a, 0x4da}], 0x2004, &(0x7f00000007c0)={[{@file_umask={'file_umask', 0x3d, 0x2}, 0x2c}, {@session={'session', 0x3d, 0xca}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, 0x400}, 0x2c}, {@umask={'umask', 0x3d, 0x1}, 0x2c}, {@session={'session', 0x3d}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, 0x6}, 0x2c}, {@codepage={'codepage', 0x3d, 'ascii'}, 0x2c}, {@quiet='quiet', 0x2c}, {@file_umask={'file_umask', 0x3d, 0x800}, 0x2c}, {@codepage={'codepage', 0x3d, 'cp857'}, 0x2c}]}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x0, &(0x7f00000001c0), 0x10b) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:58:02 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x80000000, 0x400000000900) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x1ff, 0x2, 'client1\x00', 0xffffffff80000002, "21554035e0bd76e6", "41d3406fa2349b1829e13c0a805ffb1d7e153d63207f0ef4cf7a4935250ad7c8", 0x7, 0xbae}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x7, 0x0, 0x4}, 0x2c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x3, 0x887, 0x7, 0x0, 0x3f, 0x3, 0x101}, 0xc) open_by_handle_at(r2, &(0x7f00000000c0)={0x8, 0x1}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1, 0x6, 0xb3e, 0x37e0, 0xec97}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={r3, 0x1f}, &(0x7f0000000380)=0x8) 21:58:02 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x20) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f00000000c0), &(0x7f0000000340)=0xfffffd5f) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x2, @broadcast=0xffffffff}}, 0xfffffffffffffff4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x1, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x2}]}, &(0x7f0000000200)=0x10) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r2, 0xc1}, 0x8) [ 216.297181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.302740] ? security_capable+0x99/0xc0 [ 216.306905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.312547] ? ns_capable_common+0x13f/0x170 [ 216.316977] ? kill_litter_super+0x90/0x90 [ 216.321226] sget+0x10b/0x150 [ 216.324342] ? ns_test_super+0x50/0x50 [ 216.328246] mount_bdev+0x111/0x3e0 [ 216.331878] ? jfs_destroy_inode+0x310/0x310 [ 216.336294] jfs_do_mount+0x34/0x40 [ 216.339931] mount_fs+0xae/0x328 [ 216.343313] vfs_kern_mount.part.34+0xdc/0x4e0 21:58:02 executing program 7: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7fffffff, 0x200800) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000280)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000180)=0x68) io_setup(0x800000000405, &(0x7f0000000080)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f00000000c0)=0x1000, 0x8) fcntl$dupfd(r3, 0x406, r3) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x400000400001, 0x1) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000000c0)}]) epoll_create1(0x80000) [ 216.347900] ? may_umount+0xb0/0xb0 [ 216.351626] ? _raw_read_unlock+0x22/0x30 [ 216.355768] ? __get_fs_type+0x97/0xc0 [ 216.359647] do_mount+0x581/0x30e0 [ 216.363188] ? copy_mount_string+0x40/0x40 [ 216.367442] ? copy_mount_options+0x5f/0x380 [ 216.371855] ? rcu_read_lock_sched_held+0x108/0x120 [ 216.376879] ? kmem_cache_alloc_trace+0x616/0x780 [ 216.383759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.390162] ? copy_mount_options+0x285/0x380 [ 216.394663] ksys_mount+0x12d/0x140 [ 216.398279] __x64_sys_mount+0xbe/0x150 [ 216.402884] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 216.407962] do_syscall_64+0x1b9/0x820 [ 216.411849] ? finish_task_switch+0x1d3/0x870 [ 216.416346] ? syscall_return_slowpath+0x5e0/0x5e0 [ 216.421279] ? syscall_return_slowpath+0x31d/0x5e0 [ 216.426203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.431750] ? retint_user+0x18/0x18 [ 216.435460] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.440313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.445494] RIP: 0033:0x4584aa [ 216.448676] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 216.467892] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 216.475590] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 216.483027] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 216.490292] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 216.497566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 216.504828] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000029 21:58:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x1c4) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x1, 0x9, 0x7ff}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x3001}]}]}, 0x28}, 0x1}, 0x0) 21:58:02 executing program 5 (fault-call:2 fault-nth:42): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 216.696776] FAULT_INJECTION: forcing a failure. [ 216.696776] name failslab, interval 1, probability 0, space 0, times 0 [ 216.708592] CPU: 1 PID: 11514 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 216.715963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.725326] Call Trace: [ 216.727936] dump_stack+0x1c9/0x2b4 [ 216.731611] ? dump_stack_print_info.cold.2+0x52/0x52 [ 216.736825] ? pcpu_next_fit_region.constprop.23+0x334/0x410 [ 216.742713] should_fail.cold.4+0xa/0x1a [ 216.746788] ? kasan_check_write+0x14/0x20 [ 216.751043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.756248] ? graph_lock+0x170/0x170 [ 216.760143] ? wait_for_completion+0x8d0/0x8d0 [ 216.764804] ? graph_lock+0x170/0x170 [ 216.768620] ? find_next_zero_bit+0x111/0x140 [ 216.773123] ? find_held_lock+0x36/0x1c0 [ 216.777180] ? __lock_is_held+0xb5/0x140 [ 216.781236] ? check_same_owner+0x340/0x340 [ 216.785544] ? rcu_note_context_switch+0x730/0x730 [ 216.790467] __should_failslab+0x124/0x180 [ 216.794701] should_failslab+0x9/0x14 [ 216.798499] __kmalloc+0x2c8/0x760 [ 216.802036] ? __lockdep_init_map+0x105/0x590 [ 216.806516] ? lock_acquire+0x1e4/0x540 [ 216.810478] ? __lockdep_init_map+0x105/0x590 [ 216.814967] ? __list_lru_init+0xe5/0x7c0 [ 216.819121] __list_lru_init+0xe5/0x7c0 [ 216.823106] ? list_lru_destroy+0x4d0/0x4d0 [ 216.827420] ? __lockdep_init_map+0x105/0x590 [ 216.831907] ? __init_waitqueue_head+0x9e/0x150 [ 216.836570] ? init_wait_entry+0x1c0/0x1c0 [ 216.840794] ? __lockdep_init_map+0x105/0x590 [ 216.845306] sget_userns+0x755/0xf20 [ 216.849015] ? kill_litter_super+0x90/0x90 [ 216.853258] ? ns_test_super+0x50/0x50 [ 216.857137] ? destroy_unused_super.part.11+0x110/0x110 [ 216.862488] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 216.867084] ? kasan_check_write+0x14/0x20 [ 216.871394] ? do_raw_spin_lock+0xc1/0x200 [ 216.875617] ? blkdev_get+0xc8/0xb50 [ 216.879322] ? cap_capable+0x1f9/0x260 [ 216.883210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.888753] ? security_capable+0x99/0xc0 [ 216.892912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.898435] ? ns_capable_common+0x13f/0x170 [ 216.902829] ? kill_litter_super+0x90/0x90 [ 216.907047] sget+0x10b/0x150 [ 216.910134] ? ns_test_super+0x50/0x50 [ 216.914020] mount_bdev+0x111/0x3e0 [ 216.917652] ? jfs_destroy_inode+0x310/0x310 [ 216.922066] jfs_do_mount+0x34/0x40 [ 216.925710] mount_fs+0xae/0x328 [ 216.929076] vfs_kern_mount.part.34+0xdc/0x4e0 [ 216.933656] ? may_umount+0xb0/0xb0 [ 216.937277] ? _raw_read_unlock+0x22/0x30 [ 216.941408] ? __get_fs_type+0x97/0xc0 [ 216.945307] do_mount+0x581/0x30e0 [ 216.948851] ? copy_mount_string+0x40/0x40 [ 216.953085] ? copy_mount_options+0x5f/0x380 [ 216.957494] ? rcu_read_lock_sched_held+0x108/0x120 [ 216.962512] ? kmem_cache_alloc_trace+0x616/0x780 [ 216.967370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.972896] ? _copy_from_user+0xdf/0x150 [ 216.977049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.982572] ? copy_mount_options+0x285/0x380 [ 216.987056] ksys_mount+0x12d/0x140 [ 216.990671] __x64_sys_mount+0xbe/0x150 [ 216.994633] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 216.999640] do_syscall_64+0x1b9/0x820 [ 217.003533] ? finish_task_switch+0x1d3/0x870 [ 217.008035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 217.012957] ? syscall_return_slowpath+0x31d/0x5e0 [ 217.017878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.023408] ? retint_user+0x18/0x18 [ 217.027136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.031979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.037156] RIP: 0033:0x4584aa [ 217.040326] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 217.059552] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 217.067277] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 217.074560] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 217.081872] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 217.089147] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 217.096424] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000002a 21:58:03 executing program 6: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) dup(r1) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000000680)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper={0x630b}], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000003c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x8, &(0x7f0000000080)=[@fda={0x66646185}, @fd={0x66642a85}, @flat={0x73622a85, 0x0, r2}], &(0x7f0000000240)=[0x38]}}}], 0x0, 0x0, &(0x7f0000000480)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000001c0)={r2}) 21:58:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0xfffffdd7, &(0x7f0000000540)=[{&(0x7f0000000140)=""/78, 0x4e}], 0x1, &(0x7f0000000040)=""/45, 0x2d}}], 0x1, 0x0, &(0x7f0000001f80)={0x77359400}) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x410800) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, &(0x7f0000000240)) getgroups(0x3, &(0x7f0000000280)=[0xee01, 0xee00, 0x0]) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) r7 = geteuid() lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000580)={0x1f0, 0x0, 0x8, [{{0x0, 0x0, 0x1, 0x6, 0x3, 0x3, {0x3, 0x0, 0xfffffffffffffffc, 0x1000, 0x3, 0x80, 0x1, 0x0, 0x2, 0x200, 0x4e, r3, r4, 0x8, 0x5}}, {0x3, 0x4, 0x9, 0x4cab, 'keyring(-'}}, {{0x1, 0x2, 0x8001, 0x100, 0xffffffff, 0x3, {0x4, 0x401, 0x8, 0x101, 0x3, 0x3, 0x1, 0x401, 0x4, 0xa64f, 0x8, r5, r6, 0x4, 0x3}}, {0x3, 0x3ff, 0x0, 0x9}}, {{0x1, 0x1, 0x81, 0x1f, 0x800, 0x45a3e213, {0x3, 0x7f, 0x8, 0xffffffff, 0x7fffffff, 0x2d000000000, 0x9, 0x6, 0x3f, 0x2, 0x40, r7, r8, 0x3}}, {0x4, 0x7fffffff, 0x3, 0x0, ')/]'}}]}, 0x1f0) write$eventfd(r1, &(0x7f0000000080)=0x1, 0x8) sendmmsg$unix(r0, &(0x7f0000000340), 0x4924924924926ac, 0x20000000) 21:58:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') socketpair(0x13, 0x6, 0x9, &(0x7f0000000000)) dup2(r1, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80141, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x7fff, 0x80000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x480100, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x100000000, 0xc0000) ioctl$VT_RELDISP(r2, 0xb701) 21:58:03 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r0, &(0x7f0000000080)='\x00', 0x1, 0x4008000, &(0x7f00004daff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) sendto$inet(r0, &(0x7f0000000140)='q', 0x1, 0x4000084, &(0x7f0000000240)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000180)={0x6, 0x1, 0x7fffffff}) 21:58:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)=0x1) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f00000000c0)={{0x2, 0x0, @multicast1=0xe0000001, [0xfe]}, {0x3}, 0x1, {0x2, 0x0, @loopback=0x7f000001}}) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x4, 0xb9}) 21:58:03 executing program 3: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f00000000c0)=0x6, 0xe) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") socket$inet(0x2, 0xb, 0xfffffffffffffffe) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000001480)}, 0x0) 21:58:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[], 0x0) 21:58:03 executing program 5 (fault-call:2 fault-nth:43): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 217.242947] QAT: Invalid ioctl [ 217.259557] QAT: Stopping all acceleration devices. [ 217.268843] FAULT_INJECTION: forcing a failure. [ 217.268843] name failslab, interval 1, probability 0, space 0, times 0 [ 217.280148] CPU: 1 PID: 11543 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 217.282372] QAT: Invalid ioctl [ 217.287515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.287532] Call Trace: [ 217.287561] dump_stack+0x1c9/0x2b4 [ 217.287585] ? dump_stack_print_info.cold.2+0x52/0x52 [ 217.287603] ? perf_trace_lock+0xde/0x920 [ 217.287632] should_fail.cold.4+0xa/0x1a [ 217.306821] QAT: Invalid ioctl [ 217.311534] ? perf_trace_lock+0xde/0x920 [ 217.311563] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 217.311585] ? zap_class+0x740/0x740 [ 217.311602] ? lock_acquire+0x1e4/0x540 [ 217.311620] ? graph_lock+0x170/0x170 [ 217.311644] ? find_held_lock+0x36/0x1c0 [ 217.311670] ? __lock_is_held+0xb5/0x140 [ 217.318463] QAT: Stopping all acceleration devices. [ 217.319881] ? check_same_owner+0x340/0x340 [ 217.319906] ? rcu_note_context_switch+0x730/0x730 [ 217.319931] __should_failslab+0x124/0x180 [ 217.319951] should_failslab+0x9/0x14 [ 217.319968] kmem_cache_alloc_trace+0x2cb/0x780 [ 217.319990] ? kasan_check_write+0x14/0x20 [ 217.383405] ? do_raw_spin_lock+0xc1/0x200 [ 217.383430] sget_userns+0x1cf/0xf20 [ 217.383445] ? kill_litter_super+0x90/0x90 [ 217.383466] ? ns_test_super+0x50/0x50 [ 217.383484] ? destroy_unused_super.part.11+0x110/0x110 [ 217.383498] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 217.383525] ? kasan_check_write+0x14/0x20 [ 217.383536] ? do_raw_spin_lock+0xc1/0x200 [ 217.383559] ? blkdev_get+0xc8/0xb50 [ 217.421664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.421678] ? cap_capable+0x1f9/0x260 [ 217.421697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.436642] ? security_capable+0x99/0xc0 21:58:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0f00000000000000"]}) close(r2) close(r1) 21:58:03 executing program 7: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80, 0x0) write$P9_RWSTAT(r0, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) r1 = socket(0xa, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0xfffffffffffffe33) 21:58:03 executing program 7: socket$vsock_dgram(0x28, 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f000000a000)={@empty, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4305, 0x8}}}}}, 0x0) 21:58:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x3ff, 0x10000000000009, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040)="a2", &(0x7f0000000140)=""/115}, 0x18) [ 217.440808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.446363] ? ns_capable_common+0x13f/0x170 [ 217.450793] ? kill_litter_super+0x90/0x90 [ 217.455035] sget+0x10b/0x150 [ 217.458152] ? ns_test_super+0x50/0x50 [ 217.462050] mount_bdev+0x111/0x3e0 [ 217.465683] ? jfs_destroy_inode+0x310/0x310 [ 217.470451] jfs_do_mount+0x34/0x40 [ 217.474088] mount_fs+0xae/0x328 [ 217.477464] vfs_kern_mount.part.34+0xdc/0x4e0 [ 217.482059] ? may_umount+0xb0/0xb0 [ 217.485691] ? _raw_read_unlock+0x22/0x30 [ 217.489843] ? __get_fs_type+0x97/0xc0 [ 217.493758] do_mount+0x581/0x30e0 [ 217.497312] ? do_raw_spin_unlock+0xa7/0x2f0 [ 217.501748] ? copy_mount_string+0x40/0x40 [ 217.505997] ? copy_mount_options+0x5f/0x380 [ 217.510416] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.515441] ? kmem_cache_alloc_trace+0x616/0x780 [ 217.520296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.525847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.531392] ? copy_mount_options+0x285/0x380 [ 217.535920] ksys_mount+0x12d/0x140 [ 217.539557] __x64_sys_mount+0xbe/0x150 21:58:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x7fffffff}, 0x8, 0x80800) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1) timer_create(0x3, &(0x7f000004c000)={0x0, 0x14}, &(0x7f0000000080)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) [ 217.543539] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 217.548576] do_syscall_64+0x1b9/0x820 [ 217.552527] ? finish_task_switch+0x1d3/0x870 [ 217.557041] ? syscall_return_slowpath+0x5e0/0x5e0 [ 217.562039] ? syscall_return_slowpath+0x31d/0x5e0 [ 217.567119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.572675] ? retint_user+0x18/0x18 [ 217.576411] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.581276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.586473] RIP: 0033:0x4584aa [ 217.589663] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 217.594372] binder: 11547:11551 ERROR: BC_REGISTER_LOOPER called without request [ 217.609061] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 217.609077] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 217.609084] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 21:58:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="c482dd47d2410f01b8a6000000b9800000c00f3235010000000f300f21c3c46339793200c44238f5fd66baa00066b859cc66eff3af66b8fe008ed0b9800000c00f3235002000000f30", 0x49}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = memfd_create(&(0x7f00000002c0)='ppp1keyring,\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x113, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) 21:58:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14, 0x13, 0x1, {0xe, 0x4, 0x6}}, 0x14) ioctl$RTC_PIE_OFF(r0, 0x7006) 21:58:03 executing program 5 (fault-call:2 fault-nth:44): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 217.609092] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 217.609100] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 217.609108] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000002b [ 217.716374] binder: BINDER_SET_CONTEXT_MGR already set [ 217.764515] binder: 11547:11551 ERROR: BC_REGISTER_LOOPER called without request [ 217.779105] binder_alloc: binder_alloc_mmap_handler: 11547 20001000-20004000 already mapped failed -16 [ 217.780914] FAULT_INJECTION: forcing a failure. [ 217.780914] name failslab, interval 1, probability 0, space 0, times 0 [ 217.800121] CPU: 1 PID: 11583 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 217.807511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.816878] Call Trace: [ 217.819509] dump_stack+0x1c9/0x2b4 [ 217.823174] ? dump_stack_print_info.cold.2+0x52/0x52 [ 217.827130] kvm: pic: non byte write [ 217.828458] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 217.828496] should_fail.cold.4+0xa/0x1a [ 217.828518] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 217.828537] ? unwind_get_return_address+0x61/0xa0 [ 217.839342] binder: 11547:11575 ioctl 40046207 0 returned -16 [ 217.841006] ? __save_stack_trace+0x8d/0xf0 [ 217.841029] ? graph_lock+0x170/0x170 [ 217.841055] ? find_held_lock+0x36/0x1c0 [ 217.841080] ? __lock_is_held+0xb5/0x140 [ 217.846443] kvm: pic: non byte write [ 217.851099] ? check_same_owner+0x340/0x340 [ 217.851119] ? rcu_note_context_switch+0x730/0x730 [ 217.851141] __should_failslab+0x124/0x180 [ 217.851161] should_failslab+0x9/0x14 [ 217.851175] kmem_cache_alloc_trace+0x2cb/0x780 [ 217.851187] ? __kmalloc_node+0x33/0x70 [ 217.851206] ? __kmalloc_node+0x33/0x70 [ 217.906770] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.911880] __memcg_init_list_lru_node+0x185/0x2d0 [ 217.916893] ? kvfree_rcu+0x20/0x20 [ 217.920523] ? __kmalloc_node+0x47/0x70 [ 217.924497] __list_lru_init+0x46a/0x7c0 [ 217.928547] ? list_lru_destroy+0x4d0/0x4d0 [ 217.932867] ? __lockdep_init_map+0x105/0x590 [ 217.937350] ? __init_waitqueue_head+0x9e/0x150 [ 217.942006] ? init_wait_entry+0x1c0/0x1c0 [ 217.946233] ? __lockdep_init_map+0x105/0x590 [ 217.950730] sget_userns+0x755/0xf20 [ 217.954432] ? kill_litter_super+0x90/0x90 [ 217.958663] ? ns_test_super+0x50/0x50 [ 217.962551] ? destroy_unused_super.part.11+0x110/0x110 [ 217.967901] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 217.972475] ? kasan_check_write+0x14/0x20 [ 217.976691] ? do_raw_spin_lock+0xc1/0x200 [ 217.980917] ? blkdev_get+0xc8/0xb50 [ 217.984622] ? cap_capable+0x1f9/0x260 [ 217.988502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.994031] ? security_capable+0x99/0xc0 [ 217.998171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.003697] ? ns_capable_common+0x13f/0x170 [ 218.008096] ? kill_litter_super+0x90/0x90 [ 218.012315] sget+0x10b/0x150 [ 218.015406] ? ns_test_super+0x50/0x50 [ 218.019292] mount_bdev+0x111/0x3e0 [ 218.022908] ? jfs_destroy_inode+0x310/0x310 [ 218.027314] jfs_do_mount+0x34/0x40 [ 218.030929] mount_fs+0xae/0x328 [ 218.034385] vfs_kern_mount.part.34+0xdc/0x4e0 [ 218.038955] ? may_umount+0xb0/0xb0 [ 218.042567] ? _raw_read_unlock+0x22/0x30 [ 218.046795] ? __get_fs_type+0x97/0xc0 [ 218.050679] do_mount+0x581/0x30e0 [ 218.054204] ? interrupt_entry+0xb1/0xf0 [ 218.058301] ? copy_mount_string+0x40/0x40 [ 218.062616] ? retint_kernel+0x10/0x10 [ 218.066510] ? copy_mount_options+0x1e3/0x380 [ 218.070997] ? write_comp_data+0x14/0x70 [ 218.075059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.080591] ? copy_mount_options+0x285/0x380 [ 218.085085] ksys_mount+0x12d/0x140 [ 218.088730] __x64_sys_mount+0xbe/0x150 [ 218.092867] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 218.097875] do_syscall_64+0x1b9/0x820 [ 218.101751] ? finish_task_switch+0x1d3/0x870 [ 218.106231] ? syscall_return_slowpath+0x5e0/0x5e0 [ 218.111156] ? syscall_return_slowpath+0x31d/0x5e0 [ 218.116075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.121602] ? retint_user+0x18/0x18 [ 218.125314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 218.130151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.135595] RIP: 0033:0x4584aa [ 218.138764] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 218.158036] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 218.165910] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 218.173348] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 218.180604] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 218.187865] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 218.195126] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000002c [ 218.204440] binder: 11547:11585 got reply transaction with no transaction stack [ 218.212100] binder: 11547:11585 transaction failed 29201/-71, size 80-8 line 2759 [ 218.222402] kvm: pic: non byte write [ 218.226532] kvm: pic: non byte write [ 218.230459] kvm: pic: non byte write [ 218.234630] binder: undelivered TRANSACTION_COMPLETE [ 218.239914] binder: undelivered transaction 13, process died. [ 218.252185] binder: undelivered TRANSACTION_ERROR: 29201 21:58:04 executing program 6: r0 = socket$inet(0xa, 0x6, 0x471) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, &(0x7f0000000080), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x1d, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0x120, 0x150, 0x180, [@statistic={'statistic\x00', 0x18}, @stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}, [], 0x0, 0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0xc02}}}]}, [@common=@redirect={'redirect\x00', 0x1d}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}, {{{0x5, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @empty, [], @empty, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:audisp_var_run_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x428) [ 218.263494] binder: undelivered TRANSACTION_COMPLETE [ 218.268769] binder: send failed reply for transaction 16 to 11547:11579 [ 218.275722] kvm: pic: non byte write [ 218.280592] kvm: pic: non byte write [ 218.284611] kvm: pic: non byte write [ 218.288774] kvm: pic: non byte write [ 218.297270] kvm: pic: non byte write [ 218.306103] binder: undelivered TRANSACTION_COMPLETE [ 218.311297] binder: undelivered TRANSACTION_ERROR: 29189 21:58:04 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8001, 0x101000) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000040)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffb, 0xffffffffffffffff, 0x0) 21:58:04 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5e303289b8d2a456, 0x1}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f00000000c0)) 21:58:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00'}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x100) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000040)={'nr0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x10001}, {0x80}, 0x0, 0xffffffffffffffff}) r2 = msgget$private(0x0, 0x200) msgsnd(r2, &(0x7f0000000100)={0x3, "b13ca4f77a4c61f261e00e66c282cfd83a255e014ea6019a5a8d2b3e87a32db324c09e715cf89f4eaaece6db2e09a574fcf859f6f9c867064ba61686f9bd486c4a066105129d94d1ae0201aa6a214990a49d53b074de42f96f41e999a5a624b48e481364ef4d23c33559aa0b50fd5454c6d2965578f1d2ac3e9bef63e8"}, 0x85, 0x800) 21:58:04 executing program 5 (fault-call:2 fault-nth:45): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x34, 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r1, 0x40045730, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r2, 0x200, 0x70bd2a, 0x25dfdbff, {0x10}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xe}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x50}, 0x80) 21:58:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) 21:58:04 executing program 7: r0 = syz_open_dev$mice(&(0x7f0000001a80)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abcfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) setitimer(0x2, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x7530}}, &(0x7f0000000100)) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000140)=0x100) [ 218.467323] FAULT_INJECTION: forcing a failure. [ 218.467323] name failslab, interval 1, probability 0, space 0, times 0 [ 218.478617] CPU: 0 PID: 11613 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 218.485983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.495342] Call Trace: [ 218.497945] dump_stack+0x1c9/0x2b4 [ 218.501594] ? dump_stack_print_info.cold.2+0x52/0x52 [ 218.506797] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 218.511229] should_fail.cold.4+0xa/0x1a [ 218.515309] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 218.520423] ? unwind_get_return_address+0x61/0xa0 [ 218.525368] ? __save_stack_trace+0x8d/0xf0 [ 218.529703] ? graph_lock+0x170/0x170 [ 218.533522] ? find_held_lock+0x36/0x1c0 [ 218.537601] ? __lock_is_held+0xb5/0x140 [ 218.541714] ? check_same_owner+0x340/0x340 [ 218.546050] ? rcu_note_context_switch+0x730/0x730 [ 218.550998] __should_failslab+0x124/0x180 [ 218.555243] should_failslab+0x9/0x14 [ 218.559047] kmem_cache_alloc_trace+0x2cb/0x780 [ 218.563739] ? __kmalloc_node+0x33/0x70 [ 218.567804] ? __kmalloc_node+0x33/0x70 [ 218.571783] ? rcu_read_lock_sched_held+0x108/0x120 [ 218.576800] __memcg_init_list_lru_node+0x185/0x2d0 [ 218.581809] ? kvfree_rcu+0x20/0x20 [ 218.585427] ? __kmalloc_node+0x47/0x70 [ 218.589408] __list_lru_init+0x46a/0x7c0 [ 218.593471] ? list_lru_destroy+0x4d0/0x4d0 [ 218.597790] ? __lockdep_init_map+0x105/0x590 [ 218.602280] ? __init_waitqueue_head+0x9e/0x150 [ 218.606936] ? init_wait_entry+0x1c0/0x1c0 [ 218.611164] ? __lockdep_init_map+0x105/0x590 [ 218.615656] sget_userns+0x755/0xf20 [ 218.619362] ? kill_litter_super+0x90/0x90 [ 218.623591] ? ns_test_super+0x50/0x50 [ 218.627486] ? destroy_unused_super.part.11+0x110/0x110 [ 218.632836] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 218.637410] ? kasan_check_write+0x14/0x20 [ 218.641631] ? do_raw_spin_lock+0xc1/0x200 [ 218.645865] ? blkdev_get+0xc8/0xb50 [ 218.649631] ? cap_capable+0x1f9/0x260 [ 218.653521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.659049] ? security_capable+0x99/0xc0 [ 218.663187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.668715] ? ns_capable_common+0x13f/0x170 [ 218.673113] ? kill_litter_super+0x90/0x90 [ 218.677335] sget+0x10b/0x150 [ 218.680428] ? ns_test_super+0x50/0x50 [ 218.684305] mount_bdev+0x111/0x3e0 [ 218.687921] ? jfs_destroy_inode+0x310/0x310 [ 218.692320] jfs_do_mount+0x34/0x40 [ 218.695936] mount_fs+0xae/0x328 [ 218.699294] vfs_kern_mount.part.34+0xdc/0x4e0 [ 218.703864] ? may_umount+0xb0/0xb0 [ 218.707483] ? _raw_read_unlock+0x22/0x30 [ 218.711617] ? __get_fs_type+0x97/0xc0 [ 218.715515] do_mount+0x581/0x30e0 [ 218.719052] ? copy_mount_string+0x40/0x40 [ 218.723279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.728037] ? retint_kernel+0x10/0x10 [ 218.731921] ? copy_mount_options+0x1f0/0x380 [ 218.736939] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 218.741773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.747300] ? copy_mount_options+0x285/0x380 [ 218.751798] ksys_mount+0x12d/0x140 [ 218.755422] __x64_sys_mount+0xbe/0x150 [ 218.759388] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 218.764400] do_syscall_64+0x1b9/0x820 [ 218.768276] ? finish_task_switch+0x1d3/0x870 [ 218.772764] ? syscall_return_slowpath+0x5e0/0x5e0 [ 218.777684] ? syscall_return_slowpath+0x31d/0x5e0 [ 218.782605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.788133] ? retint_user+0x18/0x18 [ 218.791839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 218.796675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.801850] RIP: 0033:0x4584aa 21:58:04 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) prctl$setmm(0x23, 0x2, &(0x7f0000fff000/0x1000)=nil) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x2000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x2, 0x40, 0x2, 0x1, 0x6}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x0, 0x3, 0xff, 0x10000, 0x5, 0xac6, 0x7f, {r2, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2e, 0x101, 0x3f46ace3, 0x2, 0x4}}, &(0x7f0000000280)=0xb0) 21:58:04 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(r0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) accept$inet(r2, 0x0, &(0x7f0000000040)) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x40, 0x40000) getdents64(r3, &(0x7f00000000c0)=""/21, 0x15) dup3(r1, r0, 0x0) [ 218.805037] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 218.824370] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 218.832068] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 218.839325] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 218.846591] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 218.853845] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 218.861111] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000002d 21:58:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000fd7000)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f000043cfff)=[{&(0x7f0000718f0a)="be", 0x1}], 0x1, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="18004aef1b3f974c9e6c16ac00000084000000000000e84a8bd416db5dd30828d810b1a10000000000000000"], 0x1c}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f00001f6000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x203}}], 0x20}], 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) openat$cgroup_int(r1, &(0x7f0000000040)='memory.swap.max\x00', 0x2, 0x0) 21:58:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8914, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r2, 0x2, 0xfffffffffffffff8}, 0xc) r3 = socket(0x10, 0x20000000802, 0x0) write(r3, &(0x7f0000000040), 0x0) write(r3, &(0x7f0000000000)="240000001a0025f00018000422edfc0e8000000000000000000000010800020048050000", 0x24) 21:58:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4080", 0xc201}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000180), 0x131) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)) 21:58:06 executing program 1: r0 = socket(0xa, 0x1, 0x0) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000005700)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000056c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000286c35b728c402009402c3f87e03ee1383b33fdb85cc00130003040000ee0000000000000000008428e5210c14032f12214bce92727830265f4261ca3a9fa4b6342f651753f6fb13042a351327b31c1dcb8feb09e3f7389f69080715398534df1a21bebdf098c192974072aff75a16bfc2f997a5965336dadd6f209e7897278e72573ef6d4c166ae8df493b106375b1061bc8271f09fff9c888bdccb", @ANYRES32=r2, @ANYBLOB="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"], 0x34}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x5, 0x9, 0x200}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r3, @in={{0x2, 0x4e24}}}, &(0x7f0000000200)=0x84) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000240)={0x1, 0x3, 0x1, 0x3, 0x7}) 21:58:06 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x1ff, &(0x7f0000000040)=""/13) 21:58:06 executing program 5 (fault-call:2 fault-nth:46): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:06 executing program 3: clone(0x40000000, &(0x7f0000000000)="fbf32da7a200df559e1cb95c240691491badcca0c7affca7dba075d46e246c9e92b3340f9fb9aeee68d7ad34c232891a9c44ebb2ba5d98c03e6bf5c351461a776e808193e80991ead3d709b1d0e06004f19897624efa4fcb7bcf00b04dce4b9fa1243718f1240f6a6f4eca77e16b05655d0df5093a3539b7619e689fdf5269f726a5638eca28a56c1ffe8842ef9622d054bb7e26257a04a99f414577d6147d5e15a73233ee03", &(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000200)="8c0f10cb54b62abb9e6dcb5eb667e307f8cc96543195bef6f28e1fc47b8485049b0813ea20e9d6ed4630f1af3765f67ffe877224c9c778533530d20e61e45e006cc38604d7d2c9206507b2e1d33477769f20c2c510afb4a9de575718f35e2cdcd9f632fe253322e2dbce3b23129e8b0d78e82a4694772fce7c6c7ea84a1974a172ff72f96062") shmget$private(0x0, 0x3000, 0x5, &(0x7f0000ffb000/0x3000)=nil) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x40, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) prctl$setptracer(0x59616d61, r2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f00000002c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000300)=""/221) 21:58:06 executing program 4: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000010c0)={0xa, 0x1, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffe1, 0x200000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) recvfrom$packet(r2, &(0x7f00000000c0)=""/227, 0xfffffffffffffdba, 0x40000060, &(0x7f0000000380)={0x11, 0x0, r3, 0x1, 0x100000001, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) 21:58:06 executing program 6: socket$unix(0x1, 0x5, 0x0) r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffd) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff7affff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 21:58:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) [ 220.691966] FAULT_INJECTION: forcing a failure. [ 220.691966] name failslab, interval 1, probability 0, space 0, times 0 [ 220.697749] IPVS: ftp: loaded support on port[0] = 21 [ 220.703285] CPU: 0 PID: 11655 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 220.715795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.725149] Call Trace: [ 220.727746] dump_stack+0x1c9/0x2b4 [ 220.731371] ? dump_stack_print_info.cold.2+0x52/0x52 [ 220.737262] ? kernel_text_address+0x79/0xf0 [ 220.741683] should_fail.cold.4+0xa/0x1a [ 220.745740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 220.750841] ? graph_lock+0x170/0x170 [ 220.754631] ? save_stack+0x43/0xd0 [ 220.758246] ? kasan_kmalloc+0xc4/0xe0 [ 220.762122] ? __kmalloc+0x14e/0x760 [ 220.765832] ? find_held_lock+0x36/0x1c0 [ 220.769888] ? __lock_is_held+0xb5/0x140 [ 220.773955] ? check_same_owner+0x340/0x340 [ 220.778274] ? rcu_note_context_switch+0x730/0x730 [ 220.783214] __should_failslab+0x124/0x180 [ 220.787443] should_failslab+0x9/0x14 [ 220.791241] kmem_cache_alloc_node_trace+0x26f/0x770 [ 220.796343] __kmalloc_node+0x33/0x70 [ 220.800146] kvmalloc_node+0x65/0xf0 [ 220.803850] __list_lru_init+0x56d/0x7c0 [ 220.807916] ? list_lru_destroy+0x4d0/0x4d0 [ 220.812231] ? __lockdep_init_map+0x105/0x590 [ 220.816721] ? __init_waitqueue_head+0x9e/0x150 [ 220.821388] ? init_wait_entry+0x1c0/0x1c0 [ 220.825610] ? __lockdep_init_map+0x105/0x590 [ 220.830111] sget_userns+0x755/0xf20 [ 220.833902] ? kill_litter_super+0x90/0x90 [ 220.838129] ? ns_test_super+0x50/0x50 [ 220.842019] ? destroy_unused_super.part.11+0x110/0x110 [ 220.847372] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 220.851944] ? kasan_check_write+0x14/0x20 [ 220.856176] ? do_raw_spin_lock+0xc1/0x200 [ 220.860414] ? blkdev_get+0xc8/0xb50 [ 220.864121] ? cap_capable+0x1f9/0x260 [ 220.868015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.873543] ? security_capable+0x99/0xc0 [ 220.877684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.883210] ? ns_capable_common+0x13f/0x170 [ 220.887629] ? kill_litter_super+0x90/0x90 [ 220.891853] sget+0x10b/0x150 [ 220.894950] ? ns_test_super+0x50/0x50 [ 220.898850] mount_bdev+0x111/0x3e0 [ 220.902469] ? jfs_destroy_inode+0x310/0x310 [ 220.906876] jfs_do_mount+0x34/0x40 [ 220.910498] mount_fs+0xae/0x328 [ 220.913867] vfs_kern_mount.part.34+0xdc/0x4e0 [ 220.918441] ? may_umount+0xb0/0xb0 [ 220.922057] ? _raw_read_unlock+0x22/0x30 [ 220.926201] ? __get_fs_type+0x97/0xc0 [ 220.930080] do_mount+0x581/0x30e0 [ 220.933607] ? do_raw_spin_unlock+0xa7/0x2f0 [ 220.938009] ? copy_mount_string+0x40/0x40 [ 220.942247] ? copy_mount_options+0x5f/0x380 [ 220.946655] ? rcu_read_lock_sched_held+0x108/0x120 [ 220.951687] ? kmem_cache_alloc_trace+0x616/0x780 [ 220.956519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.962050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.967580] ? copy_mount_options+0x285/0x380 [ 220.972066] ksys_mount+0x12d/0x140 [ 220.975687] __x64_sys_mount+0xbe/0x150 [ 220.979664] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 220.984676] do_syscall_64+0x1b9/0x820 [ 220.988549] ? finish_task_switch+0x1d3/0x870 [ 220.993035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 220.997953] ? syscall_return_slowpath+0x31d/0x5e0 [ 221.002872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.008485] ? retint_user+0x18/0x18 [ 221.012195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.017040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.022213] RIP: 0033:0x4584aa [ 221.025382] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 221.044722] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 221.052420] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 221.059686] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 221.066942] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 221.074196] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 221.081450] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000002e 21:58:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1000, 0x0, 0xa7, 0x1}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x1c) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={r1, 0x8, 0x2, 0x20000000, 0x7e, 0xffffffff7fffffff, 0x0, 0x2, {r2, @in6={{0xa, 0x4e24, 0x2, @empty, 0x10000}}, 0x8, 0x128a, 0x3, 0x9, 0x40}}, &(0x7f0000000240)=0xb0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/softnet_stat\x00') close(r3) 21:58:07 executing program 7: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000013c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000001400)={0x9, 0x3, 0x81}) recvmmsg(r0, &(0x7f0000003780)=[{{&(0x7f0000000040)=@in={0x0, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/247, 0xf7}], 0x1, &(0x7f0000000280)=""/4096, 0x747}}, {{&(0x7f0000001280)=@nfc, 0x80, &(0x7f00000025c0)=[{&(0x7f0000001300)=""/50, 0x32}, {&(0x7f0000001340)=""/78, 0x4e}, {&(0x7f0000003840)=""/81, 0x51}, {&(0x7f0000001440)=""/67, 0x43}, {&(0x7f00000014c0)=""/62, 0x159}, {&(0x7f0000001500)=""/188, 0xbc}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x7, &(0x7f0000002640)=""/56, 0x38}}, {{&(0x7f0000002680)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000002700)=""/4096, 0x1000}], 0x1, &(0x7f0000003740)=""/30, 0xfffffd8a}}], 0x40002fc, 0x0, &(0x7f0000000000)={0x77359400}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x18) 21:58:07 executing program 5 (fault-call:2 fault-nth:47): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:07 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000050bff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0xd8}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x2f, 0x6}, 0x8) [ 221.221675] IPVS: ftp: loaded support on port[0] = 21 [ 221.269681] FAULT_INJECTION: forcing a failure. [ 221.269681] name failslab, interval 1, probability 0, space 0, times 0 [ 221.281093] CPU: 1 PID: 11683 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 221.288470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.297823] Call Trace: [ 221.300412] dump_stack+0x1c9/0x2b4 [ 221.304036] ? dump_stack_print_info.cold.2+0x52/0x52 [ 221.309219] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 221.314053] ? __save_stack_trace+0x8d/0xf0 [ 221.318380] should_fail.cold.4+0xa/0x1a [ 221.322435] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 221.327530] ? save_stack+0x43/0xd0 [ 221.331151] ? kasan_kmalloc+0xc4/0xe0 [ 221.335034] ? kmem_cache_alloc_trace+0x152/0x780 [ 221.339862] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 221.345037] ? __list_lru_init+0x46a/0x7c0 [ 221.349260] ? sget_userns+0x755/0xf20 [ 221.353138] ? graph_lock+0x170/0x170 [ 221.356927] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 221.361683] ? do_mount+0x581/0x30e0 [ 221.365432] ? ksys_mount+0x12d/0x140 [ 221.369223] ? __x64_sys_mount+0xbe/0x150 [ 221.373358] ? find_held_lock+0x36/0x1c0 [ 221.377413] ? __lock_is_held+0xb5/0x140 [ 221.381500] ? check_same_owner+0x340/0x340 [ 221.385837] ? rcu_note_context_switch+0x730/0x730 [ 221.390760] __should_failslab+0x124/0x180 [ 221.394992] should_failslab+0x9/0x14 [ 221.398802] kmem_cache_alloc_trace+0x2cb/0x780 [ 221.403481] ? __kmalloc_node+0x33/0x70 [ 221.407442] ? __kmalloc_node+0x33/0x70 [ 221.411415] ? rcu_read_lock_sched_held+0x108/0x120 [ 221.416420] __memcg_init_list_lru_node+0x185/0x2d0 [ 221.421423] ? kvfree_rcu+0x20/0x20 [ 221.425040] ? __kmalloc_node+0x47/0x70 [ 221.429026] __list_lru_init+0x46a/0x7c0 [ 221.433086] ? list_lru_destroy+0x4d0/0x4d0 [ 221.437398] ? __lockdep_init_map+0x105/0x590 [ 221.441881] ? __init_waitqueue_head+0x9e/0x150 [ 221.446532] ? init_wait_entry+0x1c0/0x1c0 [ 221.450752] ? __lockdep_init_map+0x105/0x590 [ 221.455242] sget_userns+0x755/0xf20 [ 221.458940] ? kill_litter_super+0x90/0x90 [ 221.463165] ? ns_test_super+0x50/0x50 [ 221.467042] ? destroy_unused_super.part.11+0x110/0x110 [ 221.472390] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 221.476973] ? kasan_check_write+0x14/0x20 [ 221.481191] ? do_raw_spin_lock+0xc1/0x200 [ 221.485418] ? blkdev_get+0xc8/0xb50 [ 221.489125] ? cap_capable+0x1f9/0x260 [ 221.493003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.498532] ? security_capable+0x99/0xc0 [ 221.502668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.508189] ? ns_capable_common+0x13f/0x170 [ 221.512586] ? kill_litter_super+0x90/0x90 [ 221.516806] sget+0x10b/0x150 [ 221.519898] ? ns_test_super+0x50/0x50 [ 221.523773] mount_bdev+0x111/0x3e0 [ 221.527387] ? jfs_destroy_inode+0x310/0x310 [ 221.531787] jfs_do_mount+0x34/0x40 [ 221.535403] mount_fs+0xae/0x328 [ 221.538758] vfs_kern_mount.part.34+0xdc/0x4e0 [ 221.543326] ? may_umount+0xb0/0xb0 [ 221.546943] ? _raw_read_unlock+0x22/0x30 [ 221.551103] ? __get_fs_type+0x97/0xc0 [ 221.554981] do_mount+0x581/0x30e0 [ 221.558523] ? copy_mount_string+0x40/0x40 [ 221.562758] ? copy_mount_options+0x5f/0x380 [ 221.567161] ? rcu_read_lock_sched_held+0x108/0x120 [ 221.572166] ? kmem_cache_alloc_trace+0x616/0x780 [ 221.577009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.582540] ? _copy_from_user+0xdf/0x150 [ 221.586676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.592209] ? copy_mount_options+0x285/0x380 [ 221.596709] ksys_mount+0x12d/0x140 [ 221.600329] __x64_sys_mount+0xbe/0x150 [ 221.604314] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 221.609318] do_syscall_64+0x1b9/0x820 [ 221.613191] ? finish_task_switch+0x1d3/0x870 [ 221.617676] ? syscall_return_slowpath+0x5e0/0x5e0 [ 221.622592] ? syscall_return_slowpath+0x31d/0x5e0 [ 221.627522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.633053] ? retint_user+0x18/0x18 [ 221.636761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.641599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.646785] RIP: 0033:0x4584aa [ 221.649953] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 21:58:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$netlink(0x10, 0x3, 0x12) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560884470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8003, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000080)={0x9, 0x6a2, [{0x81, 0x0, 0x8}, {0x101, 0x0, 0x1000}, {0xfffffffffffffffc}, {0xd72, 0x0, 0xfffffffffffffff8}, {0x7, 0x0, 0x7}, {0x4, 0x0, 0x3}, {0x3f, 0x0, 0x50f7675d}, {0x7fff, 0x0, 0x3}, {0x10001, 0x0, 0x10001}]}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) tkill(r3, 0xf) 21:58:07 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8000, 0x0) sendmsg$nfc_llcp(r2, &(0x7f0000000480)={&(0x7f0000000180)={0x27, 0x0, 0x0, 0x3, 0xe26, 0x8001, "26b3726a2f771e8b956687cd16501b2e9d5d175e28147d7c5b38bc78ed41fdc8f74b324478933b2ba2a1f8b4dc49db855ae8cfa927485106920070d65dfc55", 0x14}, 0x60, &(0x7f0000000200)=[{&(0x7f0000000280)="e0077e5a78f2eac660c457012bf2ef6b6bdae85d65a5f0fcca088bfba442091ca288dea5d6c4663ac6a6573724d9d4b1705ba73e19d118e752b27381cc31508919433dd1bfb55f88dd72a9cb84c6a9505678d65f7c799002a6a213251d3f1090ecd9eb9d16ed7491998b028f8807fa4cebf5411badbed776dab44c87494a88fc1b9375b30fc05e53c15a8d9d0aa19459fddb8a874db7489e0fcc9905eafb5ab5672d329485d8663e9abc9bb67bdb8312bc6a5eee021572b745e3dc7d2d4d26d2fdd614bfde6662940383a246d5", 0xcd}, {&(0x7f0000000380)="b69fc5eaa46b486357c6da305052f12b94f7163dc4b9d5640857ce102a18392db6914d7fd39d282c075a9a5b073ba28eedd65dc2fdb5e77ec75d9851e09bb540987c0a87036d2209c08eb43d38", 0x4d}], 0x2, &(0x7f0000000400)={0x70, 0x119, 0x7fffffff, "709799d02808a4d7d4e7c2f3e544f56dcd654d408d0dedc0e5e3982484cdd87d79970f8eead02219a5d3876961cd3ca99d3c70342c0f114c6c5c9b242af2e10b4c793631491c6db7271dab6613f00853b20093968b678f3942b316"}, 0x70, 0x8010}, 0x40040) r3 = socket(0x11, 0x2, 0x0) bind$packet(r3, &(0x7f0000000040)={0x11, 0x3, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) bind$packet(r0, &(0x7f0000000240)={0x11, 0x20000000003, r1, 0x1, 0x0, 0x6}, 0x14) syz_emit_ethernet(0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="0180ba0000000000000000000000735a3985b303103c986fbcc55e98899c26c2153a32e193c94da71abd2b26fa59c3f32da45dd5cdb057a81275dabb58a06108d4d77d0236ea4b5f31c53937892ed6538c175072af3e6c600a0bd5a03c0fc061933b25cd"], &(0x7f0000000000)) [ 221.669222] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 221.676919] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 221.684171] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 221.691429] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 221.698682] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 221.705935] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 000000000000002f 21:58:08 executing program 5 (fault-call:2 fault-nth:48): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:08 executing program 7: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x80000f, 0xe, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x4e}, @alu={0x7, 0x7f, 0x7, 0x1, 0x3b932b9d5de7fa11, 0x10, 0xffffffffffffffff}, @ldst={0x1, 0x2, 0x1, 0x0, 0x3, 0x18, 0x4}, @alu={0x7, 0x17, 0xf, 0x6, 0x0, 0x10c, 0x15}, @alu={0x7, 0x100000001, 0x8, 0xf, 0x7, 0xfffffffffffffffd, 0x1}, @jmp={0x5, 0x1, 0xf, 0x1, 0x0, 0x98, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x19}], &(0x7f0000000000)='syzkaller\x00', 0xfffffffffffffeff, 0xe3, &(0x7f00000001c0)=""/171, 0x141100, 0x1, [], r1}, 0x48) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80, 0x101000) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x4, 0x17}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000380)={r4, 0x1}, &(0x7f00000003c0)=0x8) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$vsock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vsock\x00', 0x8000, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x400000, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r5, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x150, r6, 0x300, 0x70bd26, 0x25dfdbff, {0xc}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xfffffffffffffff7}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xc17c069}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2c}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xbad0}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x16}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xca2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}]}, 0x150}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r5, 0x800442d3, &(0x7f0000000780)={0x6, 0x10000, 0x3bc, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'yam0\x00'}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x4, 0x5) [ 221.805701] IPVS: ftp: loaded support on port[0] = 21 21:58:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x10000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000380)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0xc2, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000003c0)=0x40, 0x4) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x2000, 0x0) socket$netlink(0x10, 0x3, 0xa) memfd_create(&(0x7f0000000480)='/dev/full\x00', 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0x50, &(0x7f0000000200)}, 0x39d) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'veth0_to_team\x00', 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000300)=0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000400)={[], 0x3, 0x100000000, 0xe8, 0x3bcdee4f, 0x3, r5}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'veth0_to_team\x00'}) ioctl$VT_DISALLOCATE(r2, 0x5608) [ 221.925359] IPVS: ftp: loaded support on port[0] = 21 [ 221.947212] device veth0_to_team entered promiscuous mode [ 221.977700] device veth0_to_team left promiscuous mode [ 222.148530] FAULT_INJECTION: forcing a failure. [ 222.148530] name failslab, interval 1, probability 0, space 0, times 0 [ 222.159832] CPU: 1 PID: 11719 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 222.167259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.176615] Call Trace: [ 222.179225] dump_stack+0x1c9/0x2b4 [ 222.182872] ? dump_stack_print_info.cold.2+0x52/0x52 [ 222.188078] ? __save_stack_trace+0x8d/0xf0 [ 222.192418] should_fail.cold.4+0xa/0x1a [ 222.196492] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 222.201609] ? save_stack+0x43/0xd0 [ 222.205248] ? kasan_kmalloc+0xc4/0xe0 [ 222.209149] ? kmem_cache_alloc_trace+0x152/0x780 [ 222.213995] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 222.219197] ? __list_lru_init+0x46a/0x7c0 [ 222.223456] ? sget_userns+0x755/0xf20 [ 222.227359] ? graph_lock+0x170/0x170 [ 222.231162] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 222.235926] ? do_mount+0x581/0x30e0 [ 222.239634] ? ksys_mount+0x12d/0x140 [ 222.243423] ? __x64_sys_mount+0xbe/0x150 [ 222.247572] ? do_syscall_64+0x1b9/0x820 [ 222.251634] ? find_held_lock+0x36/0x1c0 [ 222.255717] ? __lock_is_held+0xb5/0x140 [ 222.259888] ? check_same_owner+0x340/0x340 [ 222.264222] ? rcu_note_context_switch+0x730/0x730 [ 222.269161] __should_failslab+0x124/0x180 [ 222.273401] should_failslab+0x9/0x14 [ 222.277193] kmem_cache_alloc_trace+0x2cb/0x780 [ 222.281871] ? __kmalloc_node+0x33/0x70 [ 222.285839] ? __kmalloc_node+0x33/0x70 [ 222.289804] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.294829] __memcg_init_list_lru_node+0x185/0x2d0 [ 222.299851] ? kvfree_rcu+0x20/0x20 [ 222.303476] ? __kmalloc_node+0x47/0x70 [ 222.307454] __list_lru_init+0x46a/0x7c0 [ 222.311508] ? list_lru_destroy+0x4d0/0x4d0 [ 222.315820] ? __lockdep_init_map+0x105/0x590 [ 222.320305] ? __init_waitqueue_head+0x9e/0x150 [ 222.324975] ? init_wait_entry+0x1c0/0x1c0 [ 222.329226] ? __lockdep_init_map+0x105/0x590 [ 222.333721] sget_userns+0x755/0xf20 [ 222.337433] ? kill_litter_super+0x90/0x90 [ 222.341658] ? ns_test_super+0x50/0x50 [ 222.345542] ? destroy_unused_super.part.11+0x110/0x110 [ 222.350895] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 222.355472] ? kasan_check_write+0x14/0x20 [ 222.359708] ? do_raw_spin_lock+0xc1/0x200 [ 222.363938] ? blkdev_get+0xc8/0xb50 [ 222.367643] ? cap_capable+0x1f9/0x260 [ 222.371522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.377061] ? security_capable+0x99/0xc0 [ 222.381212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.386754] ? ns_capable_common+0x13f/0x170 [ 222.391159] ? kill_litter_super+0x90/0x90 [ 222.395399] sget+0x10b/0x150 [ 222.398490] ? ns_test_super+0x50/0x50 [ 222.402368] mount_bdev+0x111/0x3e0 [ 222.405987] ? jfs_destroy_inode+0x310/0x310 [ 222.410418] jfs_do_mount+0x34/0x40 [ 222.414054] mount_fs+0xae/0x328 [ 222.417417] vfs_kern_mount.part.34+0xdc/0x4e0 [ 222.421986] ? may_umount+0xb0/0xb0 [ 222.425602] ? _raw_read_unlock+0x22/0x30 [ 222.429733] ? __get_fs_type+0x97/0xc0 [ 222.433621] do_mount+0x581/0x30e0 [ 222.437157] ? do_raw_spin_unlock+0xa7/0x2f0 [ 222.441577] ? copy_mount_string+0x40/0x40 [ 222.445819] ? copy_mount_options+0x5f/0x380 [ 222.450214] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.455221] ? kmem_cache_alloc_trace+0x616/0x780 [ 222.460059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.465604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.471133] ? copy_mount_options+0x285/0x380 [ 222.475617] ksys_mount+0x12d/0x140 [ 222.479236] __x64_sys_mount+0xbe/0x150 [ 222.483201] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 222.488204] do_syscall_64+0x1b9/0x820 [ 222.492080] ? finish_task_switch+0x1d3/0x870 [ 222.496561] ? syscall_return_slowpath+0x5e0/0x5e0 [ 222.501478] ? syscall_return_slowpath+0x31d/0x5e0 [ 222.506396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.511917] ? retint_user+0x18/0x18 [ 222.515617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.520460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.525639] RIP: 0033:0x4584aa [ 222.528816] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 222.548069] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 222.555771] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 222.563044] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 222.571203] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 222.578471] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 222.585741] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000030 [ 222.611227] device veth0_to_team entered promiscuous mode [ 222.622267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.629932] device veth0_to_team left promiscuous mode 21:58:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000680)='auxv\x00') setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100}, 0x10) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000000c0)={0x7, 0xffff, 0x1}) sync_file_range(r0, 0x168c, 0xffffffff, 0x2) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209, 0x2}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x74, "303c237ae438313d312db54f6e57f40f34277abdc0bf824cf126140102dbfc36eb4091b9c97ee0028405d6b01ea7a7bf3f1ce74d7c07002a3d79635fba5a9ab53f96b248b051ca55ac2480e22225b5bfa209f2ebcc424f56b421219b373fdea93c5eb691445ab9a0335cfe2b1b6cfa0d1246e3a8"}, &(0x7f0000000100)=0x7c) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in={{0x2, 0x4e24}}}, 0x84) 21:58:10 executing program 7: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="025cc83d6d345f8f") r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x0, 0x7}) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000100)={0xcf, ""/207}) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xff4c) 21:58:10 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x9) socket(0xf, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x2c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f0000000240), &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x340) 21:58:11 executing program 3: clone(0x40000000, &(0x7f0000000000)="fbf32da7a200df559e1cb95c240691491badcca0c7affca7dba075d46e246c9e92b3340f9fb9aeee68d7ad34c232891a9c44ebb2ba5d98c03e6bf5c351461a776e808193e80991ead3d709b1d0e06004f19897624efa4fcb7bcf00b04dce4b9fa1243718f1240f6a6f4eca77e16b05655d0df5093a3539b7619e689fdf5269f726a5638eca28a56c1ffe8842ef9622d054bb7e26257a04a99f414577d6147d5e15a73233ee03", &(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000200)="8c0f10cb54b62abb9e6dcb5eb667e307f8cc96543195bef6f28e1fc47b8485049b0813ea20e9d6ed4630f1af3765f67ffe877224c9c778533530d20e61e45e006cc38604d7d2c9206507b2e1d33477769f20c2c510afb4a9de575718f35e2cdcd9f632fe253322e2dbce3b23129e8b0d78e82a4694772fce7c6c7ea84a1974a172ff72f96062") shmget$private(0x0, 0x3000, 0x5, &(0x7f0000ffb000/0x3000)=nil) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x40, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) prctl$setptracer(0x59616d61, r2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f00000002c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000300)=""/221) 21:58:11 executing program 5 (fault-call:2 fault-nth:49): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:11 executing program 0: mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x86d3f3590b9e8372) connect$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x7, 0x4, 0x7, "7f78f6b77b11c8f961c7b4e0a08d16ee382ef6473b3aa57acf038157ba41d5fe03d89d548951a61ea612654d3a699fb5a0d28a4a02b65fa6a2dc1163633346", 0x24}, 0x60) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200020000f801", 0x17, 0x2}], 0x1021010, &(0x7f0000000040)=ANY=[@ANYBLOB="64d774"]) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x200, 0x3ff, 0x1, 0x0, 0x0, [{r0, 0x0, 0x6e61}]}) 21:58:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) 21:58:11 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000e25000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x2) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f00003e7000/0x4000)=nil, 0x4000}) 21:58:11 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000eff0)=[{&(0x7f00000001c0)="240000001900030007ff0907000083be8020000000040005035a5bf4d31d85680300a33f", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x2802) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x4) 21:58:11 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)="0be5a941a701000000000000009c9ba267486f9cc24554221e55a4cc302d2fd9a1ec1d7af1fb9a603f972b79a30000252fe11cf5d332dfd310d8e3b18a9bb7315745568225c3c4a0321e8517ca321b4033ccaa3e6406780b3f3751ca93c385f7ab309cd73f411d8526c86f2f41c0dd0d79a7639bd647f9b41d8c4fca3f1c1a4b0150fd42d2c3b9e10666e451f285a512ce8f7542e848c30119575f4f65831225f938238869ede9bb9e3c89d44fe80e3d9bdde7c5a5b81dbead77f6f884b3b42f9a57cd0df1978d7dd67244c821e8d797f980a187afc27fdca0a58d0a1733b6753eb4297913bd725e3263056efdd808a341170f2cca80826d79c706125f1622875ae92746cfe516a6afa447704edfe094bdde864ee5b055743393f19720ed497459804ce1a5dc7948a5279808b809e6b03939cc50be291824f18bd0614ddc8d59f2c5ef89fb8f3d28857ddad4157b44c6f63f047817c68a1e94e7386699994f6e33aecd057f39cc8f426f75e2aaeecec4a0d935892d69e7ae29cf50b458e44af73031cacd2106beea55c69fa4f828e1fdb93994b52d2fd76d29bb7b3275efe91b7de4a6e02553144aa913e105c3cad928b7ab1ff8db3574e5bf8fe12a76ce030c8112c7ec1ca381be36da1ebc40641321c9f20d6534d190f1154a88b00b2ad5396f7696e552736d493d19364ad5e290d4c88c5513f547d36b88a311a04873e2f5", 0x200}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) r1 = syz_open_procfs(r0, &(0x7f0000000380)="6e65742f69705f7461626c65735fc4e7384870746172") timerfd_gettime(r1, &(0x7f0000000240)) 21:58:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000200)={0x1d}, 0x10) sendmsg$can_bcm(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d}, 0x10, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="0000000001e100000000000000000000388dbba2b150d176fd055510a762040476ec2e07be6e6b9b08e03294b463bb0b85af8e437e135a6bf6ba217735a2e5634327f1fc0d1bf881883209024e7275c662f06a6dcc5501fa881bb1"], 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x1d}, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}, 0x1}, 0x0) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000080)) recvmmsg(r1, &(0x7f0000000600)=[{{&(0x7f0000000400)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f00000005c0)}}], 0x1, 0x0, &(0x7f00000006c0)) [ 225.007600] FAULT_INJECTION: forcing a failure. [ 225.007600] name failslab, interval 1, probability 0, space 0, times 0 [ 225.019148] CPU: 0 PID: 11755 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 225.026524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.035889] Call Trace: [ 225.038508] dump_stack+0x1c9/0x2b4 [ 225.042164] ? dump_stack_print_info.cold.2+0x52/0x52 [ 225.047376] ? finish_task_switch+0x1d3/0x870 [ 225.051906] ? finish_task_switch+0x18a/0x870 [ 225.056451] should_fail.cold.4+0xa/0x1a [ 225.060554] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 225.065688] ? __schedule+0x884/0x1ed0 [ 225.069681] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 225.074464] ? do_mount+0x581/0x30e0 [ 225.078210] ? __sched_text_start+0x8/0x8 [ 225.082374] ? find_held_lock+0x36/0x1c0 [ 225.086460] ? __lock_is_held+0xb5/0x140 [ 225.090561] ? check_same_owner+0x340/0x340 [ 225.094915] __should_failslab+0x124/0x180 [ 225.099174] should_failslab+0x9/0x14 [ 225.102993] kmem_cache_alloc_trace+0x2cb/0x780 [ 225.107688] ? __kmalloc_node+0x33/0x70 [ 225.111654] ? __kmalloc_node+0x33/0x70 [ 225.115622] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.120650] __memcg_init_list_lru_node+0x185/0x2d0 [ 225.125655] ? kvfree_rcu+0x20/0x20 [ 225.129281] ? __kmalloc_node+0x47/0x70 [ 225.133268] __list_lru_init+0x46a/0x7c0 [ 225.137319] ? list_lru_destroy+0x4d0/0x4d0 [ 225.141628] ? __lockdep_init_map+0x105/0x590 [ 225.146208] ? __init_waitqueue_head+0x9e/0x150 [ 225.150864] ? init_wait_entry+0x1c0/0x1c0 [ 225.155087] ? __lockdep_init_map+0x105/0x590 [ 225.159580] sget_userns+0x755/0xf20 [ 225.163296] ? kill_litter_super+0x90/0x90 [ 225.167523] ? ns_test_super+0x50/0x50 [ 225.171413] ? destroy_unused_super.part.11+0x110/0x110 [ 225.176773] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 225.181345] ? kasan_check_write+0x14/0x20 [ 225.185564] ? do_raw_spin_lock+0xc1/0x200 [ 225.189789] ? blkdev_get+0xc8/0xb50 [ 225.193500] ? cap_capable+0x1f9/0x260 [ 225.197383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.202908] ? security_capable+0x99/0xc0 [ 225.207057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.212592] ? ns_capable_common+0x13f/0x170 [ 225.216989] ? kill_litter_super+0x90/0x90 [ 225.221212] sget+0x10b/0x150 [ 225.224307] ? ns_test_super+0x50/0x50 [ 225.228183] mount_bdev+0x111/0x3e0 [ 225.231797] ? jfs_destroy_inode+0x310/0x310 [ 225.236205] jfs_do_mount+0x34/0x40 [ 225.239845] mount_fs+0xae/0x328 [ 225.243203] vfs_kern_mount.part.34+0xdc/0x4e0 [ 225.247771] ? may_umount+0xb0/0xb0 [ 225.251385] ? _raw_read_unlock+0x22/0x30 [ 225.255519] ? __get_fs_type+0x97/0xc0 [ 225.259396] do_mount+0x581/0x30e0 [ 225.262925] ? do_raw_spin_unlock+0xa7/0x2f0 [ 225.267322] ? copy_mount_string+0x40/0x40 [ 225.271559] ? copy_mount_options+0x5f/0x380 [ 225.275957] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.280962] ? kmem_cache_alloc_trace+0x616/0x780 [ 225.285809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 225.291341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.296864] ? copy_mount_options+0x285/0x380 [ 225.301364] ksys_mount+0x12d/0x140 [ 225.304983] __x64_sys_mount+0xbe/0x150 [ 225.308956] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 225.313972] do_syscall_64+0x1b9/0x820 [ 225.317858] ? finish_task_switch+0x1d3/0x870 [ 225.322358] ? syscall_return_slowpath+0x5e0/0x5e0 [ 225.327281] ? syscall_return_slowpath+0x31d/0x5e0 [ 225.332223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.337760] ? retint_user+0x18/0x18 [ 225.341472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 225.346317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.351493] RIP: 0033:0x4584aa [ 225.354662] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 225.373934] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 225.383838] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 225.391097] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 225.398943] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 21:58:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) getsockname$packet(r0, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xffffffff, 0x202, 0x0, 0xffffffffffff0312, r1}, &(0x7f0000000100)=0x10) 21:58:11 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000180)="5500000018007f5300fe0192a4a280930a60782b541a4302910000003900090035002000030000001900050000000000000000dc1338d54400009bcdc66ef75afb83de448daa7227c43ab8220000060cec4fab91cf", 0x55}], 0x1, &(0x7f00000013c0)}, 0x0) r1 = accept(r0, &(0x7f0000000200)=@in6, &(0x7f0000000280)=0x80) accept4$nfc_llcp(r1, &(0x7f00000002c0), &(0x7f0000000340)=0x60, 0x80800) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x1f, 0x9}) [ 225.406891] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 225.414317] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000031 [ 225.422716] Dev loop6 SGI disklabel: csum bad, label corrupted [ 225.429125] Dev loop6: unable to read RDB block 1 [ 225.434104] loop6: unable to read partition table [ 225.442227] loop6: partition table beyond EOD, truncated [ 225.448193] loop_reread_partitions: partition scan of loop6 () failed (rc=-5) 21:58:11 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x40000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1e525e0d6851a45f}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r1, 0x428, 0x70bd29, 0x25dfdbff, {0xe}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1f}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)={0x2, 0x1, 0x0, 0x2, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}]}, 0xfffffffffffffdac}, 0x1}, 0x50) 21:58:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) socketpair(0x9, 0xb4fb474b98c4745a, 0xffffffffffffffad, &(0x7f0000000940)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000980)={'filter\x00'}, &(0x7f0000000a00)=0x54) read$FUSE(r0, &(0x7f0000001000), 0x1000) prctl$getreaper(0x28, &(0x7f0000000040)) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1dcb}}, 0x50) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 21:58:11 executing program 5 (fault-call:2 fault-nth:50): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 225.519667] IPv6: NLM_F_CREATE should be specified when creating new route [ 225.545923] Dev loop6 SGI disklabel: csum bad, label corrupted [ 225.552196] Dev loop6: unable to read RDB block 1 [ 225.557190] loop6: unable to read partition table 21:58:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d3ab27191a01002356ba602dff050022fef9b9afa4b20079", 0x18) r2 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="5b90bff4f1bd9ce47807a1cf32639eefea344451f35cc4304429bcb3c90600a55d5e7d60223d64f388bc796605a52b8633879edb41f5b7bcb0618aa2158f96f9272c7261fe70f4962de67aa6835109e0e95314118c557be17b05d1bc05ac6534679b5801b63ab84b0bfe151e652b7f166b02a4020ebc516e09c5965fac86b2354b1783ae47fa80c8a87e87772e482ff8b7ecb41e907f87cf49b357ecea5ba3aa270d933afb1ad3f144c0c7d08a4be2e5cec15e76e20756ed235960310e466d48945177c998bb833b896a0f4e0d108a41206a702c76d9d4", 0xd7, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f00000000c0)=""/96, 0x60) sendmmsg$alg(r1, &(0x7f00000024c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000640)="bb51e44d8438b90ef5f9aa516235ff24af7473", 0x13}], 0x1, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000180)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000500)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 21:58:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4013, r1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) shutdown(r2, 0x1) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0xf5f) r3 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r3, &(0x7f0000000240)='U', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x10000}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001040)={r4, @in6={{0xa, 0x4e22, 0x7, @loopback={0x0, 0x1}, 0x2}}}, 0x84) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0)="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", 0xc42, 0xffffffffffffffff) close(r2) [ 225.598216] loop6: partition table beyond EOD, truncated [ 225.603912] loop_reread_partitions: partition scan of loop6 () failed (rc=-5) 21:58:11 executing program 1: socket(0x0, 0x0, 0xd78) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000100)="2200000019000714f7ffffff08000700", 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000380)=r0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000280)={0x0, 'ip6_vti0\x00', 0x2}, 0x18) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fchdir(r0) ftruncate(r0, 0x6) r3 = open(&(0x7f0000000040)='./bus\x00', 0x4040, 0x0) lseek(r2, 0x0, 0x3) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f00000002c0)=0x1) rt_sigtimedwait(&(0x7f0000000000)={0x8}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) truncate(&(0x7f0000000240)='./bus\x00', 0x0) unlink(&(0x7f0000000140)='./bus\x00') [ 225.685651] FAULT_INJECTION: forcing a failure. [ 225.685651] name failslab, interval 1, probability 0, space 0, times 0 [ 225.697084] CPU: 0 PID: 11792 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 225.704461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.714607] Call Trace: [ 225.717225] dump_stack+0x1c9/0x2b4 [ 225.720862] ? dump_stack_print_info.cold.2+0x52/0x52 [ 225.726063] ? __save_stack_trace+0x8d/0xf0 [ 225.730410] should_fail.cold.4+0xa/0x1a [ 225.734499] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 225.739621] ? save_stack+0x43/0xd0 [ 225.743259] ? kasan_kmalloc+0xc4/0xe0 [ 225.747152] ? kmem_cache_alloc_trace+0x152/0x780 [ 225.752003] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 225.757206] ? __list_lru_init+0x46a/0x7c0 [ 225.761454] ? sget_userns+0x755/0xf20 [ 225.765351] ? graph_lock+0x170/0x170 [ 225.769259] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 225.774029] ? do_mount+0x581/0x30e0 [ 225.777753] ? ksys_mount+0x12d/0x140 [ 225.781554] ? __x64_sys_mount+0xbe/0x150 [ 225.785709] ? do_syscall_64+0x1b9/0x820 [ 225.789888] ? find_held_lock+0x36/0x1c0 [ 225.793990] ? __lock_is_held+0xb5/0x140 [ 225.798097] ? check_same_owner+0x340/0x340 [ 225.803045] ? rcu_note_context_switch+0x730/0x730 [ 225.808013] __should_failslab+0x124/0x180 [ 225.812273] should_failslab+0x9/0x14 [ 225.816100] kmem_cache_alloc_trace+0x2cb/0x780 [ 225.820789] ? __kmalloc_node+0x33/0x70 [ 225.824891] ? __kmalloc_node+0x33/0x70 [ 225.828896] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.833937] __memcg_init_list_lru_node+0x185/0x2d0 [ 225.838981] ? kvfree_rcu+0x20/0x20 [ 225.842622] ? __kmalloc_node+0x47/0x70 [ 225.846608] __list_lru_init+0x46a/0x7c0 [ 225.850675] ? list_lru_destroy+0x4d0/0x4d0 [ 225.855015] ? __lockdep_init_map+0x105/0x590 [ 225.858176] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 225.859796] ? __init_waitqueue_head+0x9e/0x150 [ 225.859815] ? init_wait_entry+0x1c0/0x1c0 [ 225.859835] ? __lockdep_init_map+0x105/0x590 [ 225.883562] sget_userns+0x755/0xf20 [ 225.887289] ? kill_litter_super+0x90/0x90 [ 225.891544] ? ns_test_super+0x50/0x50 [ 225.895485] ? destroy_unused_super.part.11+0x110/0x110 [ 225.900873] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 225.905566] ? kasan_check_write+0x14/0x20 [ 225.909813] ? do_raw_spin_lock+0xc1/0x200 [ 225.914066] ? blkdev_get+0xc8/0xb50 [ 225.917793] ? cap_capable+0x1f9/0x260 [ 225.921696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.927239] ? security_capable+0x99/0xc0 [ 225.931400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.934497] Option ' [ 225.936942] ? ns_capable_common+0x13f/0x170 [ 225.936962] ? kill_litter_super+0x90/0x90 [ 225.936978] sget+0x10b/0x150 [ 225.936992] ? ns_test_super+0x50/0x50 [ 225.937011] mount_bdev+0x111/0x3e0 [ 225.937029] ? jfs_destroy_inode+0x310/0x310 [ 225.937048] jfs_do_mount+0x34/0x40 [ 225.937065] mount_fs+0xae/0x328 [ 225.937086] vfs_kern_mount.part.34+0xdc/0x4e0 [ 226.059681] ? may_umount+0xb0/0xb0 [ 226.063307] ? _raw_read_unlock+0x22/0x30 [ 226.067441] ? __get_fs_type+0x97/0xc0 [ 226.071320] do_mount+0x581/0x30e0 [ 226.074862] ? copy_mount_string+0x40/0x40 [ 226.079099] ? copy_mount_options+0x5f/0x380 [ 226.083498] ? rcu_read_lock_sched_held+0x108/0x120 [ 226.088508] ? kmem_cache_alloc_trace+0x616/0x780 [ 226.093347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.098874] ? _copy_from_user+0xdf/0x150 [ 226.103021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.108551] ? copy_mount_options+0x285/0x380 [ 226.113051] ksys_mount+0x12d/0x140 [ 226.116693] __x64_sys_mount+0xbe/0x150 [ 226.120661] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 226.125669] do_syscall_64+0x1b9/0x820 [ 226.129545] ? finish_task_switch+0x1d3/0x870 [ 226.134037] ? syscall_return_slowpath+0x5e0/0x5e0 [ 226.138958] ? syscall_return_slowpath+0x31d/0x5e0 [ 226.143880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.149420] ? retint_user+0x18/0x18 [ 226.153133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.157986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.163215] RIP: 0033:0x4584aa [ 226.166392] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 226.185736] RSP: 002b:00007f38ff45ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 226.193443] RAX: ffffffffffffffda RBX: 00007f38ff45eb30 RCX: 00000000004584aa [ 226.200872] RDX: 00007f38ff45ead0 RSI: 00000000200001c0 RDI: 00007f38ff45eaf0 [ 226.208133] RBP: 00000000200001c0 R08: 00007f38ff45eb30 R09: 00007f38ff45ead0 [ 226.215401] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 226.222918] R13: 0000000000000000 R14: 00000000004d3ce0 R15: 0000000000000032 21:58:12 executing program 3: clone(0x40000000, &(0x7f0000000000)="fbf32da7a200df559e1cb95c240691491badcca0c7affca7dba075d46e246c9e92b3340f9fb9aeee68d7ad34c232891a9c44ebb2ba5d98c03e6bf5c351461a776e808193e80991ead3d709b1d0e06004f19897624efa4fcb7bcf00b04dce4b9fa1243718f1240f6a6f4eca77e16b05655d0df5093a3539b7619e689fdf5269f726a5638eca28a56c1ffe8842ef9622d054bb7e26257a04a99f414577d6147d5e15a73233ee03", &(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000200)="8c0f10cb54b62abb9e6dcb5eb667e307f8cc96543195bef6f28e1fc47b8485049b0813ea20e9d6ed4630f1af3765f67ffe877224c9c778533530d20e61e45e006cc38604d7d2c9206507b2e1d33477769f20c2c510afb4a9de575718f35e2cdcd9f632fe253322e2dbce3b23129e8b0d78e82a4694772fce7c6c7ea84a1974a172ff72f96062") shmget$private(0x0, 0x3000, 0x5, &(0x7f0000ffb000/0x3000)=nil) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x40, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) prctl$setptracer(0x59616d61, r2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f00000002c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000300)=""/221) 21:58:12 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc4c85512, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f00000000c0)}) socketpair(0x10, 0xf, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) socketpair$inet(0x2, 0x80000, 0xfff, &(0x7f0000000040)) 21:58:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f757015"], 0x8c) 21:58:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffff9c, 0x0, [0xa]}, 0x2c) openat$uinput(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/uinput\x00', 0x80, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0020df38248143375b93b5ac15fe820b7a2e38a246940dae073a0afb0329aec4f424f7064ab561d9b4de261595f3d5ff2d3837caee4ca515837adc707b6b6cee057d10871c8b2b993f392cb6a05774bcd9c828e3b415413f1b3bad88ebaf46f62e9f7e02475f27db63244f3fec1d76f18686e502a6f0f803018aeb5950c19bdc858ba5dfd19cd2dd8dc8085cae0c456556bbebabc28a0137c42ff3cc618c4fa486b5e71b5c03578865b3de2ff4ae419cc771ab110ec760521280e46d5388280726b5f9b7cc7ac9df8c6470285652ceb5a480"]) 21:58:12 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x4) ioctl(r0, 0x5, &(0x7f00000001c0)="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") fcntl$getown(r0, 0x9) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x200, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x1, 0x4, 0x1, r1}) 21:58:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x10008912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000040)=0x200000a45, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) r2 = open(&(0x7f0000000100)='./file0\x00', 0x4000, 0x111) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000140)={0x2800}, 0x1) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom$inet6(r1, &(0x7f0000000080)=""/49, 0x31, 0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x709000) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) [ 226.368925] Option ' 21:58:12 executing program 1: mq_open(&(0x7f0000000000)='GPL\x00', 0x40, 0xa1, &(0x7f0000000040)={0x2, 0x8000, 0x8, 0x7f, 0x0, 0x1, 0x4, 0x904}) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x18}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x616, &(0x7f0000000080)=""/251}, 0x18) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x1000, "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"}, &(0x7f0000001240)=0x1008) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000001280)={r1, 0x6, 0x7ff, 0x2, 0x2, 0x2}, &(0x7f00000012c0)=0x14) [ 226.532992] XFS (loop4): Mounting V4 Filesystem [ 226.561863] XFS (loop4): totally zeroed log [ 226.576771] XFS (loop4): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 226.586768] XFS (loop4): Unmount and run xfs_repair [ 226.591860] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 226.598594] 000000000514982a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.607482] 0000000056d1e862: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.616369] 000000007a68ba15: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.625261] 0000000039fdd2a3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.634135] 000000000136740f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.643058] 0000000027e6936b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.651932] 00000000c2de606b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.660818] 0000000027e6a1fb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 226.669833] XFS (loop4): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 226.679486] XFS (loop4): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 226.688510] XFS (loop4): Failed to read root inode 0x80, error 117 21:58:13 executing program 7: perf_event_open(&(0x7f00000002c0)={0x1000000000000002, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x40, 0x8) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='\'\x00', r0}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='\'\x00'}, 0xfffffffffffffd7c) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x0, {0xa, 0x4e22, 0x6914de72, @local={0xfe, 0x80, [], 0xaa}, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000380), r3}}, 0x2d0) socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0xffff}, &(0x7f0000000400)=0x8) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000040)=""/102) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000440)={r4, 0x1f, 0x7, 0x50328fe7}, &(0x7f0000000480)=0x10) 21:58:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000003580)={&(0x7f00000003c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003440)=""/112, 0x200034b0}], 0x1, &(0x7f0000003500)=""/106, 0x6a}, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x8044000000201, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000080)="0bf5430f0803b9", 0x7}], 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000100), &(0x7f0000000140)=0x4) 21:58:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0xffffffffffffffda, 0x3, {{0x0, 0x2e, 0x2, r1}}}, 0x28) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000050c0), 0x1000) open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x0, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 21:58:13 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) syz_mount_image$jfs(&(0x7f0000000300)='jfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000028c0)) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x80, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000004c0)={0x0, 0x7, 0x5, 0x13}, &(0x7f0000000500)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000540)={r1, 0x100000000, 0x1}, 0x8) 21:58:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f757015"], 0x8c) 21:58:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000001800)={[{@logdev={'logdev', 0x3d, './file0/file0'}, 0x2c}, {@logdev={'logdev', 0x3d, './file0/file0'}, 0x2c}]}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="03754752485039ffa7ea2afb1ad29911975c10df55976fe3ff325de90c180e378abf323f026131bd09348c892142157efca8b61bbb441c40be0566bf5108918c30ca5ffdd11f7f8d5428fc57ae5c7d87a9d169e99666eb42d4fddb32d027dc7836f569f12a9f2477d536ae0f4670abd9648876da9206541998ff09c7468deda8542575cf37eb42ec", 0x88, 0x3}, {&(0x7f00000001c0)="75e205d7e5238aba45fc7400", 0xc, 0x4}], 0x40000, &(0x7f0000000400)) eventfd2(0xfffffffffffffffb, 0x800) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000440)="20adc9331f36f5408789ca4906c3a9bbe3a7206f60dc8b34197bdb6fbce2a2235d7941dea1b40e51eb551f80426c4a1c7ef707c691792aca798c6f15f43191238e87ead7852c7192199345ef99d24e9a3090912a3be728bbf0cd521c36e681fecae12cfd9e427ce9c5df7782ca258458a76f98af86384d2bb1df32b238f5349ffd5b8fc08ff4e009f7bf149ebb1b8c1ae08cef641cdd00c6663d36369beffb7be2f30c4d8e6ae73c2e479539cff501a90bec3656b1de41cbd36c47040db4c6360bc984ec49dd4ffce7f0274fade8bbd08fecf4a3354f6f9c7cf4b361314fefde59c4f016123596e184a961") 21:58:13 executing program 3: clone(0x40000000, &(0x7f0000000000)="fbf32da7a200df559e1cb95c240691491badcca0c7affca7dba075d46e246c9e92b3340f9fb9aeee68d7ad34c232891a9c44ebb2ba5d98c03e6bf5c351461a776e808193e80991ead3d709b1d0e06004f19897624efa4fcb7bcf00b04dce4b9fa1243718f1240f6a6f4eca77e16b05655d0df5093a3539b7619e689fdf5269f726a5638eca28a56c1ffe8842ef9622d054bb7e26257a04a99f414577d6147d5e15a73233ee03", &(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000200)="8c0f10cb54b62abb9e6dcb5eb667e307f8cc96543195bef6f28e1fc47b8485049b0813ea20e9d6ed4630f1af3765f67ffe877224c9c778533530d20e61e45e006cc38604d7d2c9206507b2e1d33477769f20c2c510afb4a9de575718f35e2cdcd9f632fe253322e2dbce3b23129e8b0d78e82a4694772fce7c6c7ea84a1974a172ff72f96062") shmget$private(0x0, 0x3000, 0x5, &(0x7f0000ffb000/0x3000)=nil) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x40, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) prctl$setptracer(0x59616d61, r2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f00000002c0)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000300)=""/221) 21:58:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000180)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r1, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000023c0), 0x218, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000002840)=""/4096, 0x7ffff000}], 0x1, &(0x7f00000000c0)=""/87, 0x57}, 0x0) [ 227.484226] XFS (loop4): Invalid device [./file0/file0], error=-2 [ 227.504754] jfs: Unrecognized mount option "u" or missing value [ 227.513063] IPVS: ftp: loaded support on port[0] = 21 21:58:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000b29f57)=@random={'trusted.', "0000000201000000000000010400"}, &(0x7f0000227f74)=""/140, 0x8c) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x55, 0x1) setsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000040)=0x1, 0x4) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3a70) gettid() 21:58:13 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') fchmod(r1, 0x0) preadv(r0, &(0x7f0000001180)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) 21:58:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='\nfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 227.604891] XFS (loop4): Invalid device [./file0/file0], error=-2 21:58:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") userfaultfd(0x80000) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80008, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340834b80040d8c5602062200010400004001000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) 21:58:13 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'ip6gretap0\x00'}}, 0x1e) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x143, 0x500) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={@empty, @broadcast, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000580)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000600)={@dev, 0x0}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000003500)={@dev, @empty, 0x0}, &(0x7f0000003540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003980)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000003a80)=0xe8) recvmmsg(r1, &(0x7f0000004840)=[{{&(0x7f0000003c40)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003cc0)=""/86, 0x56}, {&(0x7f0000003d40)=""/76, 0x4c}, {&(0x7f0000003dc0)=""/88, 0x58}, {&(0x7f0000003e40)=""/105, 0x69}, {&(0x7f0000003ec0)=""/241, 0xf1}, {&(0x7f0000003fc0)=""/203, 0xcb}], 0x6, &(0x7f0000004140)=""/12, 0xc, 0x6}, 0x9}, {{&(0x7f0000004180)=@nfc, 0x80, &(0x7f00000047c0)=[{&(0x7f0000004200)=""/115, 0x73}, {&(0x7f0000004280)=""/231, 0xe7}, {&(0x7f0000004380)=""/6, 0x6}, {&(0x7f00000043c0)=""/254, 0xfe}, {&(0x7f00000044c0)=""/234, 0xea}, {&(0x7f00000045c0)=""/79, 0x4f}, {&(0x7f0000004640)=""/109, 0x6d}, {&(0x7f00000046c0)=""/198, 0xc6}], 0x8, 0x0, 0x0, 0x3df}, 0x2}], 0x2, 0x10141, &(0x7f00000048c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000049c0)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000004ac0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004b00)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000004c00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004f80)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000005080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000051c0)={@multicast2, @empty, 0x0}, &(0x7f0000005200)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000005240)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f00000052c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000005280)={&(0x7f0000006b80)={0x460, r3, 0xd00, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x204, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r5}}, {0x8, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r6}}, {0x8, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r9}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r10}, {0xbc, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r11}}, {0x8, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7b}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x7e6}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}]}}]}, 0x460}, 0x1}, 0x4) sendmmsg(r0, &(0x7f0000005b00)=[{{&(0x7f00000055c0)=@nl=@kern={0x10}, 0x80, &(0x7f0000005640), 0x0, &(0x7f0000005680)}}, {{&(0x7f0000005840)=@pppoe={0x18, 0x0, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'veth1_to_team\x00'}}, 0x80, &(0x7f0000005ac0)}}], 0x2, 0x0) 21:58:14 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000380)={0x8004, 0x800000000001a, 0x0, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200000, 0x0) write$P9_RWRITE(r5, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x8}, 0xb) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000026c000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000280)="450f01cf66ba4300b04dee660f38338f0f000000c744240000000100c744240200000000c7442406000000000f0114240fd18f10ba94c83e466d41f466b8bc008ee8f30f0159e60f01bb07000000", 0x4e}], 0x1, 0x0, &(0x7f0000000180), 0x0) [ 227.758795] mmap: syz-executor6 (11916) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:58:14 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x3, 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$sock_SIOCGPGRP(r2, 0xae78, &(0x7f0000006380)) 21:58:14 executing program 1: syz_mount_image$nfs4(&(0x7f00000002c0)='nfs4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000540)='noacl') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40400, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x60, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x4) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000080)={0x1f, 0x53, 0x200}) 21:58:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x3) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)) 21:58:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = dup3(r0, r0, 0x80000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r1, &(0x7f00000003c0)="2505323853ca6ae21e9072f4ee88dd2e281af14624a71ab5964645644fcb6955e0c7a579591239cfc3baf5868d9cb3a878ee9fbdd7a75aafc360369d329d58e3ec0f653d080d0b7eb041c933216b172605adfaa42ffb8aa68497058c091ad9c2610f910bc928b4b15cae07ad020da251d38c83d73042aaabbfc19e1ef97e9685272163d6bacb453ae1c21c76034b465ea4501ae21c393aea689bed84536f359441c5f28358ff0d7178a36acf9342bd23cc9abd22e7c44fa3b186fb81e72fdd9764a6668b5e301cbe1a19d74579566e39b9241d31d76a67abc62a2b34068c8b7abfc867f3", &(0x7f00000004c0)=""/83}, 0x18) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000000c0)=""/123) r3 = add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)="49bff08f17a859ec7039ea7eca29aa2af360dd457b4a601f557e6beb31262003f9c90038ca0c62ccb99e40352f5dbea7c5c6d2300db21b20f4f5c82ac10ceff004d068b5196c85bd09910912e0fe3b7ae14f6429c742d62924c2840bfcc92845274d633c424715cdffb800356b4bac2390f6dfd4a9da7e588636fbc2769659d95c1bdc5030075e734bd0a2b7ca314d9402e8e0f40f727ca210eea9aea20f83f72c0622e942e6708457c91225ccb665a9bb2f440cef57b4d931c285b16484eca52fba220c7a9a", 0xc6, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={'\x00', {0x2, 0x4e21}}) keyctl$search(0xa, r3, &(0x7f0000000280)='logon\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, r4) 21:58:14 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) read$FUSE(r5, &(0x7f0000001380), 0x1000) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r5, 0xc008744c, &(0x7f0000003000)=""/174) 21:58:14 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000140), 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400002, 0x20) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000001000)=@filter={'filter\x00', 0xe, 0x4, 0xe70, [0x0, 0x20000180, 0x20000b60, 0x20000e78], 0x0, &(0x7f0000000080), &(0x7f0000001080)=ANY=[@ANYBLOB="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"]}, 0xef4) 21:58:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f757015"], 0x8c) 21:58:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x3) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)) 21:58:14 executing program 7: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x200000000001f) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) 21:58:14 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x101, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000100)=['syz0\x00'], 0x5}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f0000000380), &(0x7f0000000300)=0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={r2, r3, r4}, 0xc) 21:58:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000001580)={0x0, 0x7fff, 0x3, [0x9, 0x7, 0xffffffffffffffff]}, &(0x7f00000015c0)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000018c0)={0x2, 0x1, 0x0, 0x2, 0x0}, &(0x7f0000001900)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000002e00)={0x0, 0x4c, &(0x7f0000002d80)=[@in={0x2, 0x4e20}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0x4bcf}, @in={0x2, 0x4e21, @broadcast=0xffffffff}]}, &(0x7f0000002e40)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000002e80)={0x3, 0xe, 0x6, 0x3c2d, 0x0}, &(0x7f0000002ec0)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000002f00)=@assoc_value={0x0}, &(0x7f0000002f40)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000002f80)={0x2, [0x0, 0x0]}, &(0x7f0000002fc0)=0xc) sendmmsg$inet_sctp(r1, &(0x7f0000003100)=[{&(0x7f0000000100)=@in6={0xa, 0x4e23, 0xdf02, @empty, 0x3}, 0x1c, &(0x7f0000001500)=[{&(0x7f0000000140)="0111d8885c23a35ddf827de013543677dbaf0e15fd7dabbda367093bc86c80156d84d1faf23db4fcddd68a88bd395d3806c1b2cb60fac52b87c7fd9b95599bb5a45a5695f02f5825978fd9cf21cef825e28785c5f3873094049229ed7c6811d366a04ed780304b2b9df614dbb972dcbe13ef47c047341053da8b34fb534d48da7f9454593fa28b94c36b9e64b1ab7216a915f340900aed38aaa5634ab4c0b938cf4c43f28e1847e0b3dea4234d8c0553071d2a9f0efaff3fe87a0c6cee22784b904af92604eb72b134c04a5bba38a6ce44f4353a1dce4c", 0xd7}, {&(0x7f0000000240)="0a75aa8349a534ae95c6e3a1867ab2574a20ff8bd27f42d0f63a0a51bc7c7a", 0x1f}, {&(0x7f0000000280)="e7c8df42b519140eeb47a6a637d8f3bb8abf5786de27e22cda3b98d85995682d812530bb15dc08f7b22f", 0x2a}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)="7a2c21c4a5db1d306a29c967171da4edc751a76ef121097191da2df05b46e541e07b611b772529d6baca944ba514ed37a6ae3145c8fa2e9c5b71f921ec6b7cfb09e8dfdd20fe5c453ae70a9632641c05429d85185e4636", 0x57}, {&(0x7f0000001380)="b571d4639fd93e65df5451401dd2d677c8f0db9e7409d9c799a9caa20a6e4d8618dbc1279c6f0071d861b24c39fc8472729ded49024c1934738bda7abad3528dfdfeb822dfcda4bfe5abcb0cb2ef3145642ee9243b120ab22fbf9f7b1efee89bad836843e453a5e40ebcfff775731eb18b22720d52a63a06e85c407382ba1eedef20882ee4f3bba8ddd8256b8d3fb2248a835228b8d24f6ac47df378dca50b7d1e0a205d8fa77d409d7deaa3f1e5968dccfa8384034d77abfe7b133fd10b347aa010b39e4b0b2155b7c205f8de864fa648926fe04df2a4421c977d35c75d35adf8b95e1e11f3240dbc5f97fa586192f4c8b51cc4", 0xf4}, {&(0x7f0000001480)="fae4c39aae8bf2e91f755dfca65f8e1c15945625a01c28ef4d8bd84d10f020a19a529d6a0f08b64b961d8942cc9164c32d9f058fc648e14bfd05c73bf5331ed3a632f9acf37466933890f7c3670153c21923ff0bda74b0883088791a", 0x5c}], 0x8, &(0x7f0000001600)=[@init={0x18, 0x84, 0x0, {0x95e, 0x0, 0x4c95, 0x5}}, @authinfo={0x18, 0x84, 0x6}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, @authinfo={0x18, 0x84, 0x6, {0x20}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xfffffffffffffffa}}, @sndrcv={0x30, 0x84, 0x1, {0x3ff, 0x5, 0x8004, 0x9, 0x0, 0x0, 0x5, 0x8, r2}}], 0xb0, 0x4}, {&(0x7f00000016c0)=@in={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10, &(0x7f0000001880)=[{&(0x7f0000001700)="0d45d585394bba55d88860a847b47d8f946b382844c766f4b730ccc6f5ee14c614b048ec9f80607841de731cc708d72606873f8aa92254493ec514c4037ce3673cc517c1259a8128b9c9a957d6628115b4b9e135318d0561b2d4e7e07e9c6adbd14a58c1767ea66ffee82761af19dd8e11d6", 0x72}, {&(0x7f0000001780)="d1abcd1f9a8df6cc1e5805b6a9176920abd47ce5fa4e7db8f54894ad6367cda083df3bddc78af9ba4be86fa839c88c40bac767cdbbeaf359d8a058bbcc3aa93f8d911758bbe1426c01266637cf54f21658382cd91bdc7706e1ff7dbb037e5bd863c14ae9690182b80339561a23e1dab5c2cbbf2068c6505f20097ae85d2c2b95db89215f824b76f0f5388fd33071e0c4914dfa0a3cfe889241a98bb64a33b162c5eb7044d92ab1197b971e420c88e415cd4f4485fed88e5c6e732fb143fe533ad2350d2d73c563766a3eb3d6a21ac71195dd9cf559f16360cf25d19a2a41bef6487440caba28a9f6497ba59ead31efa892", 0xf1}], 0x2, &(0x7f0000001940)=[@sndrcv={0x30, 0x84, 0x1, {0xf2b5, 0x7, 0x8, 0x6, 0xf3, 0x1, 0x0, 0x8, r3}}], 0x30, 0x1}, {&(0x7f0000001980)=@in6={0xa, 0x4e20, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x5}, 0x1c, &(0x7f0000002d00)=[{&(0x7f00000019c0)="d2c6210f1c22e3952f1a4a6542aac9", 0xf}, {&(0x7f0000001a00)="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", 0x1000}, {&(0x7f0000002a00)="50d079471e25f9f399c0b661b197a71f6721f0a688581fce559d99092bd999d00e2e28ec0d7d870cab0507b9a02a79f42cd75076688cd9a1717424a4c924cddaad3191a464238c3eaa16d9a2e37e3c4abbdb23d227d21ab11876d274dd07182b8a5e437247407f72073be61c9ae511efb9ebc54f5d20f52aeae234ce2306975696e98c8dee6058f330d15095c5681391718ace5479a3252dd51fc8b7141b68fc48fd344f95e5428435eb1259c666f7440156c1562ad4d7ee4b7440cc19e88dc22a32aa3340ca6385f17c6a6b2c1d41e8c21dbfcbe8fdd58bc34c33fa3b98266d4ccc", 0xe2}, {&(0x7f0000002b00)="fa1733e4b2382e330c24dbb4f30fa0454c2d623f9de3353b9aa018a40d436d143d7de0b581e078db1fc2c7c0bf566ec1babce9c59d1fe46dc7e9a1cc37f09d43c022b8242be7e522c1ad5588d3abe667cd2dc359088f746417c2dd893773e48eaf7fd7ab379e074ff601f9889849d352b8fee06f0c5798df7047221b2aba797487b44818f41812a5779ab5d6dd653c208b9e3d38b1fa919d95a7f003dac8eeca934cf04e", 0xa4}, {&(0x7f0000002bc0)="b2d5880fe754d8b45b967660c38c23c08d15d2d5140a6bfd0dfc56d22755f322e09362ac", 0x24}, {&(0x7f0000002c00)="78fbd2f3a6de77bc2c995b321cb5f06f2f885ffe8e50542b66c75e7e0b913487eb562aed09cd7eddd6402f57604e260d8a69bc25f4197a9c18b8c3ba8df9fbabb207e018ba05524ba763eb80176f4735b933e9bbf30edc338446d9ff25b60ee40875be18b39e341e9094b54e787ea7c57a3cf7b093f3be54bce0aec994ea4d2e622a189e0975fee3e583c5429d67ee1cba582a7b5c1122c629608f392fc17f3029399ce6766096936be8bf10e8e0e44a581190f178b1f17a30c2b949771867893d1a6102cca7839eb58d223e7f106bc3", 0xd0}], 0x6, &(0x7f0000003000)=[@sndinfo={0x20, 0x84, 0x2, {0x3, 0xa, 0x3, 0x0, r4}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2={0xff, 0x2, [], 0x1}}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x8200, 0x100, 0x40, r5}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x6, 0x4, 0x4, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x20b, 0x7, 0x8, 0x4, 0x6, 0x6, 0x4, 0x100000001, r7}}], 0xc8, 0x1}], 0x3, 0x48d0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={"766574000000000000000000bd6800", 0x43732e5398417f1b}) 21:58:14 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) read$FUSE(r5, &(0x7f0000001380), 0x1000) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r5, 0xc008744c, &(0x7f0000003000)=""/174) 21:58:14 executing program 3: prctl$setname(0xf, &(0x7f0000000000)='\x00') seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) 21:58:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='%fs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) poll(&(0x7f0000001180)=[{r0, 0x402}, {0xffffffffffffffff, 0xa8}, {0xffffffffffffffff, 0x1000}, {r0}, {r0, 0x8000}], 0x5, 0x80000000) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x70bd2d, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}]}, 0x70}, 0x1}, 0x0) 21:58:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000002100010100000000000000000a0000000052c73049679097e5002491e2224edb74cd0000"], 0x1}, 0x1}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:58:14 executing program 7: [ 228.585390] audit: type=1326 audit(1531432694.833:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11984 comm="" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x0 [ 228.604108] audit: type=1326 audit(1531432694.834:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11984 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x0 21:58:14 executing program 0: 21:58:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:14 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x84, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000300)={0x0, 0x0, 0xfffffffffffffffe}) 21:58:15 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) read$FUSE(r5, &(0x7f0000001380), 0x1000) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r5, 0xc008744c, &(0x7f0000003000)=""/174) 21:58:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='j\ns\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded"], 0xd2) 21:58:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x32) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80047453, &(0x7f0000000180)) 21:58:15 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:15 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) read$FUSE(r5, &(0x7f0000001380), 0x1000) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r5, 0xc008744c, &(0x7f0000003000)=""/174) 21:58:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='j%s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)}, &(0x7f0000000440)=0x10) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000002c0)=@broute={'broute\x00', 0x20, 0x1, 0x190, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, &(0x7f0000000000), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'tunl0\x00', 'team0\x00', 'veth0_to_bond\x00', 'vlan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0xd0, 0xd0, 0x100, [@cpu={'cpu\x00', 0x8}, @cgroup0={'cgroup\x00', 0x8}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x208) 21:58:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 229.654007] x_tables: eb_tables: cgroup match: used from hooks BROUTING, but only valid from INPUT/OUTPUT/POSTROUTING 21:58:16 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) read$FUSE(r5, &(0x7f0000001380), 0x1000) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r5, 0xc008744c, &(0x7f0000003000)=""/174) 21:58:16 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c020000005f8f762070") syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2b}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 21:58:16 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) read$FUSE(r5, &(0x7f0000001380), 0x1000) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000001000)=""/246) 21:58:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='j.s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 229.780359] x_tables: eb_tables: cgroup match: used from hooks BROUTING, but only valid from INPUT/OUTPUT/POSTROUTING 21:58:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000010c0)={0x18, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x7592da32}, [@nested={0x4, 0x26}]}, 0x18}, 0x1}, 0x0) 21:58:16 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 229.934320] netlink: 'syz-executor1': attribute type 38 has an invalid length. [ 230.041671] netlink: 'syz-executor1': attribute type 38 has an invalid length. 21:58:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='j/s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:16 executing program 0: r0 = semget(0x2, 0x3, 0x8) semtimedop(r0, &(0x7f0000000180)=[{0x0, 0x1, 0x1800}, {0x1, 0x5, 0x1000}, {0x5, 0x1, 0x800}, {0x3, 0x7, 0x800}, {0x6, 0x1f}, {0x2, 0x8, 0x800}, {0x0, 0xfffffffffffff800, 0x800}, {0x0, 0xfffffffffffffffe, 0x800}, {0x6, 0x0, 0x1000}, {0x1, 0x592d5e88, 0x800}], 0xa, &(0x7f00000001c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000001880)=ANY=[]) r1 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100)=0xff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={"6c6f3a05e6ff0100", {0x2}}) fallocate(r1, 0x0, 0x800000, 0x8) statfs(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000200)=""/229) 21:58:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded"], 0xd2) 21:58:16 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:16 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000000080)="dc"}, 0x20) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x58, &(0x7f0000000140)=[@in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x80, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e24, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x7}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x8, 0x0, 0x2, 0x3, 0x8, 0x1, 0x6, r2}, &(0x7f0000000280)=0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 21:58:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xf4, 0x400) write$tun(r1, &(0x7f0000000080)={@void, @void, @ipx={0xffff, 0xcf, 0x80000000, 0x5, {@broadcast=0xffffffff, @current, 0x80}, {@broadcast=0xffffffff, @current, 0x7}, "9482a6132203110c58c70277fb3b73b91daf04b397cd2ea2bd0f29977703e058fed03ff375bdb4ce3c12e91ee3d736c139dde9e06f0a6035542954890b871a98b1a13a0ce00dfa4b6e9137e06874c5fe398641cc19964f85712dd1ce4b3d13057365f6824b084434d1a8de50aa245826b5eac774ee6a82455f2e90f6cba73675ba00e11acddaae4eaee84f75943cb639a2f1af184868fa47b755ceadce15ba1132539d4657467cb9e56b403ae9d7bd77e2"}}, 0xcf) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x1, 0x4) tee(r1, r1, 0x8, 0x1) sendto$inet6(r0, &(0x7f0000000300)="040400000309c14609005375c52cf7c21975e697b02f5c566b2b2ff0dac8897c6b11876d886b6621d8d207ccf73f257e55e86eb29406136fcfffffffffbe62159403c7a6", 0x44, 0x0, &(0x7f0000000000)={0xa, 0x800, 0x4, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0xc8) 21:58:16 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) read$FUSE(r5, &(0x7f0000001380), 0x1000) [ 230.559880] protocol 4a75 is buggy, dev gre0 21:58:16 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x8002, 0x1c5, &(0x7f0000000840)=[{&(0x7f0000000240)="e4739ffc7d329abc0eae75fb93d6cbf912be1d8fa3099a3eb02ba80b750f1ce94f99cbcf086d836d4816f0dd96e72f1df8bc33b8a336efb65bb1a15aa915ae4ecfd86d6a819cf5910532500c2410ac0a295343897abccefc65f7154ef3b9a8c8a4c5af35d8ec98cd3cbbe788a7f055361edbd38b793360d329776c6cc9600140dc825df10729e575410e35f310d5647119e07efe9a", 0x0, 0xfffffffffffffffc}, {&(0x7f0000000300)="c0564f62cd6741c668864b435d93a0481867301043bbb5b2e9f389cd2c6489f027e6513d3ed1a41b9376da5b6aec725f93548f07af455a0de7278a34368be15262bf0144a9d05290a21e8b10bc24fb9e02acdae12a18632cfc170403dce62a5d9748b64e3b81a8c471f5e21162070e15b6c1f1b050a0bf96588a772fcc9e43db080676042cbea9eaf6ba0e94c24574a05ca65f0222de15c947f61cf0080b4562fadfe30fa70468b14d086c17d343a5bd48fee6e56b5d72cfb1e0251e95fd0df24c22a9f3e96ac5f9d69f", 0x0, 0x1}, {&(0x7f0000000400)="00185f953c18aadc3a7a6999a6d9ca556c4903e20665e358eeeb032d716e7a4bf5b39796ac3e0ec5b3e4aa6e6bc1acf65ce8f2e50eb3b32a3e24da479bf4d78a09b0f185d2613295f0759d9d084d7520c6f8edbf99753c7fa6cc4534f984211452d1b75f35f076dbecccc5758e75c9403606ca85d55f0feb165bf1c20ec617c7facc356c947c50f7f8c73f109410240ca599e8c69f1c41e8d434f2cba2b64a6cd47741d867950a0db066305d378c", 0x0, 0x10001}, {&(0x7f00000004c0)="2c7f76bfdbbfa4795995ff5352b9e0d5289211bfbe88e46c17b6ca941b65ef046ddc4849691aee97240672d08a14939122e56b85789523e6069ff9d694ca580a59ef014c9c34cd0af9a1c9171cbcb207fa680270dee43065a293be1d02af2e07e8b34abde7b1b096b7613d9c67fc9e391e878edea15edf12c82360a302666e1aa88f62a976afa1bbced10608f21c39513c2de70c213f3eb143ca43b279964a82970b828843da58efd61c101b2f0b9b6d00b6b307a0", 0x0, 0x200}, {&(0x7f00000001c0)="94e292e27d04d2410683c369910bda159b78e3", 0x0, 0x6efc}, {&(0x7f0000000580)="91d81e4a2f02d3d643b97d440b9ca435583c74d6aa2b8154cf2bdb5d021f302ca6715226b580a90bb09e848ac29a4aa9ec6f06d9adda9419c314a700f3114a86cbbc540098fb893366cab09dcf7aaddf0b1963a475467e533169f44d4c450118f5bb4f291ec5963b5593da4d97da9c32fbbc61ea86e46a17a0b27a787b69d211e602a83f1b487a5cf1f0231104a029a406fe3a1d1f258d44d02fa966aef0bcf5f9b14121ab0f0107eb6b90fbf575a285d0102246896dc4e1e9597087c80badafae1af3b0fc", 0x0, 0x6}, {&(0x7f0000000680)="1b11ded75c6043e3a348b5aef55ed285eb21e9b32345436614fd36717fc5efa1b73511dd26b1e59f0ce9bdd2f0589662ae41acc82fbac6c208808696197e9ccec51732fd19509a880fcf0264066c332f1be114ea1a551e35619643a1bed476f72192fba35241f9420a86ea711fe79d6a4a00501013ea2276d05e8239a405d96f98c301d8614dc688896d2c77d92a5f92efae648bd1ecb1b34b6b1562c03b059ee718effb4b84c9339101855ba14905fa0baacf6778e445618b39469a97971671563820e22ca6e555faf8fb1ea3", 0x0, 0x7ffffffb}, {&(0x7f0000000100)="5bd09356830f29fb21197812809c88e0fc6c82cb363ea023ec56f10890195ba825c9e7b711e1781dd1eaa50cbc9516a75077310f6cafe381664d83ac0041447af0", 0x0, 0x1618}, {&(0x7f0000000780)="6d9cd2806a8583dfce109c708f0753cd43161524a54a1289a27358d87b80bb40d85ee2689701c1ceb525b9d8d34766a8ef0456e340e4934d02a51a84fc12eebb72f53a04c137653a656c32b0a274887e978f3e61933db64c539e687d539deb70ab51831479ee00bdefb4c4d6974eefaa06a106c769396b10b88c4102ba93a8a39d8c539ae40e60885d77ed6932eb17", 0x0, 0x3dc}], 0xfffffffffffffffd, &(0x7f0000000180)={[{@fat=@nocase='nocase', 0x2c}, {@nodots='nodots', 0x2c}, {@dots='dots', 0x2c}, {@dots='dots', 0x2c}]}) 21:58:16 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$alg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000001b80)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000000)=0x78) 21:58:16 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000000040)=0xffffff4a) 21:58:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:16 executing program 7: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfo\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:17 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) 21:58:17 executing program 4: nanosleep(&(0x7f0000000140)={0x77359400}, &(0x7f00000002c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000000004, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x100, 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000000c0)={0x7, 0x5}) io_setup(0xffff, &(0x7f0000000040)) socket$inet6(0xa, 0x0, 0x0) 21:58:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:17 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x4) r0 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x14) r1 = memfd_create(&(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='\x00', 0x0, 0xfffffffffffffffd) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x0, 0x16, 0x5, 0x4, "b4a20776a6a61d9ed65f37066e61764c216282dbbb97c27e6ec566ae55c1417b"}) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000000), 0x4) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)='p\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) 21:58:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0x2) sendmsg(r0, &(0x7f0000002780)={&(0x7f0000000200)=@ipx={0x4, 0xffffffffffffffff, 0x8, "acd0b8eaa363", 0x6}, 0x80, &(0x7f0000002680)=[{&(0x7f0000000080)="3a00095a0f4d5c91f52bae950d23a6f3b2c8d98803060c80d9d8a9a7979bdf2403fd8689c7c16be7abdd7359ec158e0f", 0x30}, {&(0x7f00000002c0)="3cbf12d31028604991d528154079c177aa3c805fd9a10ff0f8511486a291bfbcd1", 0x21}, {&(0x7f0000000300)="dcf5f6394f9f2ba75d81ad9b9a1b75457359214220ac3192189cbd11a1ac099df8c5e55755e77725cfbdee57244b32407fc31a434598a52fa5f1d484c4e81d43c766bd1eae35100f88815ad1f4af33c595f10149595a06098765853467d29fae6b4105dffe66b9f9963b3fadb79e00b66dcebeb942c20d8654c91c", 0x7b}, {&(0x7f0000000380)="b65e08c0b802844027782bdb7b15d44ed9f7b01ef20db5ca639f7644f21c725f34ecba5e53fdded7e7eb4b63cec243cbbda36586e2342ec3dcbbc5390e0488196c18b35f9e119a6008a94d7f82a86c3b7924260b378bf2229715b0a76eba88c36da61a32b92b6777edced2fd03737ee05de58ae6515cbd079ea5dd19847aec5deb7dc06f2548e08bcaf5a6894058b352a8aa1f525ad8c723c8b7908c54e49ca2dd3af962aebeb182bf5ffef30d9623dcf40d3a2ec0b6b9f6b5e3704ed55428bcd0b3159de6cdbb1e5c22be382df3e98b58b65ff1753bd234c5", 0xd9}, {&(0x7f0000000480)="947b576254517114adc15f047c095b7ea1fc0c325c990ffd28e05de57676cdf8664c6faff595636b37b615874bbc29a4a9bd7a4f87b504a8e3b20b9a1ea7f1a9c5031129dd39268324f4b31ae26f93eee305762a323af18d1d9d8a914c221caefc787030c34f118d84c64a981925acba33ef4c0a033657377773f4ccf41483b7afdb1f6499f8f17f61304235a3c2aeefa718041ab5", 0x95}, {&(0x7f0000000540)="1b963237564104b62aea7b94534f8d2e9d748ab53622e2c02a6a49be7bf6b8fbcb1c011a748f20d8194c7cf3218cdbacb12bd233b071ca5f536fb157e1232ba4fb6449599c25dcac748c03b1b85f9c07e14b5721004accdef8b0c896ccd3f95113ef3ef5bdb37070a960c9edb0ba43d49354e8ae8a725f6d24164116f17dc997e56ece047fb1ad9b741a5f0eaedf663607c20e37b3cdee9c9cb554a494fa27d5e22f51f95b1ff0ebcf967e413f37a5f9cb0fa0d1bacf2fb7792b20d405d810febc75263e0d74e8781a546939defcd2e95dce227c89f806", 0xd7}, {&(0x7f0000000640)="e93c2628cec3067f5b427f8d5a27ab0184502a25c0623f18ef7af735f46c405e33c5af6d3e90a810716ee60c994239f2e2c38b634fa2bb366e93110e3d2c501af8adbf5f11f2f2b580a8b87813dda8fa396ed2d8e70e6b5a6a2d9b7a7c386d589bf5e92e9ab102b8e8b7c55648877b07c22a391b4fc945d6b490b1d189f3aea978ff8191164426ee33a715289ef0aaf77c2bb4f4b850b9c038371f8187a916f9eab97d3f58656326ed2cb0d2522aeffa78fbdeb8cfb7c3f9932c80873e11ac8f82b182eaa2eca065c879c72e68b05eeb710a7c6164ae3d73c9fc0d18b741af23fc8a67cc98ee04ea404a73058097c44bf4828228574a25ac7ed42bbb16d0661a17609c96770ccf123d2b08f3ffc5fe830059eb1bbe312f3d3571cacb4984cb55befe9fb2dbc40b22cbfb1416dce516056144ee8da66414cd052488c87c2c311df759eebd9e402fd8d4f9255e315adb4c9369dd82af227f767bca41d29dbf98dce98578d60e3f45e2ce5efa8f8ffff01d33ba5a82268c3063e82aed6818f6772320c645ef1c27e4db09ece6f2d6401d98250c53d11e44e29b78e8dd370b5f1b14413ba6aaacb31cd5c253abaea160c26276ddda0a1a05168ef821dd219db27e5fabd0dd02e373b32743edc8a563eb8639933369e286aacdecbde97a12fa47a80fb308d64f5ab5c22cb2bfb9c18828ea0fedea3a22106c8158d3efd5e565edbcdb8d0b7400f2ef2f937a8253dc69b2458179250f7bfcae14922074dfd5e19c61b4d7a5ede64394145e8f2ecceabc345362d3003ed757d48f1ac39cb6e445945f4126364ac79ea52089f44431fdb0f54785863137ea8f889dfefb51821d644e0ec488b992ac46b5a1dbb9fb589cfa49c11c2c14ab38384d57355dc693effccf5e23e2e2289813cf9ca1d1ce3786ab51e859e7ab2a9491d75e536f1bfa241e265a1646e46c65c310f962433161f015b45a548213138eb8180e86035ece28e70fb85e57600b75bc1cbdff46bd7725a918b94089e4ec2ccb294a68b7f4be52981295fe3815c57f26ad980093d2121803a43f253a67fd8fa01476fa64d140416a9f22d4c96a29938773926f8583c1271054e835d66cc443b7b5e9c2bffa0992ed1541c732fb10b2689d14dd0be7a348864087d3be540651958107dd5a9c46842c6b5850ec3accd6c55bbfd06536a1367c09e054c3a85ea211c3519f5e1fff48cd170f5ee623c7aff75f9ada2a044482e263d10e1e74d550de75f3d74d84c6a120c69e7f1bccc687fd4370223171dc70d512d5c068d070cffd289da2c65a97b3b3dc6ee0b3d568c9d4c1b0324c95792c7ff973ed8023671b874387752d8504ffb0ad9043dafbe922cdfefadce4feed5d27d72ceb18b1e33201ec7fa62a3326901c203cd906cfd40853b00554549ee69592b6abba0a8ce6e3c3094811e9710a1e781eb88060e111a942bcea384e0f80e1a12d0199b1a37544989e028b9062a55fd98eb49306b36ea8b66bdd2caf88a06d7d734ed5fb9bdd965c358ad1c785fa9d8f2e4f3adc95a4610757aeb99d145ecfad167b453a265cdd4247b493bf3a1c062438e46d5f38a851924056cc21b1fc68fa13988984f59ec45e0cf1ba4f09d9261e4418a8b40b5b18e4f2d482061a6e83d67428727f59a31d5c8d5d34bfe75622043454fcf6b3980e741eb291e6f85747a9fb62f511ebc0f85171bfab83cfb2de7a8dbefca712d0add0291e41718521fe4971cabc5886342270253458a378edea2d86fb0ece4149f7029e8e517562bad1e204792384306365e0b103756f4fc205bceccdf19f76f1aaf4bd6b8c424a6220d2d2733b94746fc9c15143ed961c3867f05a8b59f9bd193161569e484808884e7793ce3e78f3df39d101d395216eda397f127187eac01a0444f4361da4d99efd41cf5489a1d92544757d52128bdd56c96ecfeb44b064b9e450d4b6391681612d5b0c6dbada247b60077b0316c72b43e97e3bdbca8594a7066273e9fca2f2515f66a618d7fdba5df099ecd02f1f4d9e9aee2fc414ac4c2f69791b5ec26a601ed22be58818a45555a9d1c5bd10b1e640255eb8594918d99ab757eb4ce9afc85195414c9cdc707c63ae23c4016bc5382741c4e8f1e6891e0d3165e04865c980e9c2fd034663df3e10471fa04054ac0c156eae51e52df8edfa372690e4500ae87b41ff2fda4e15079279ed7c339911474a12ce62164d367e973dc8bc2e27eb847a5f3f1c45a40addf01a1ee1fcc87c6e98a46eb46cd50d4cfc33ead755283308036cef2bcc7c14d1a4de0e8c051f8faff7171bfa4fb56ab38367015fb5a0220cbff7f670699de826a95283525f479bbbe03bbb0f9f746e48cc32cbe4a8b39e6799c15dcc11d666632a043cec44b0829c90e18eb5e0f46ca11c644848a66d447e1c4cb16974ff3b092972b12dae1dfc8767420b1053e8504da6e7ea2792dec2ad4f3a39f642dd3fb79ef9c348a59cf389ee70da5af550e8cc9448a1f847078533bbfeb6ed5a713f2c3c69bfc315074d20a2eef651ff3d16774c8465d131274d0453bf691146f618b8e54ba9e63c6720bdc7f6cfbd2c8160e5b562a30bbda51f32459384981f6ed46aa00763fc14d1a0d86fa8e63a2b13e554d4f3b9ac33712a36407ba8e8d7f10670b2dce5ee4dc577f60dc059bd1c6cf3067b999c7a18486af1cfc9ea8f35e329da7d44b9444d4cbd5a74af5181c9635b01570ba8219ba850240a58cf8a4d18674d829e339f79c92179a018d3cf53fb9780686ff8720ae9892199d1b0e23f82ce91e591e19b5a314b9a478b1c9dae2564f5ed7a466766c59f5eb5c34f78cb2d0dcbaead63ed3e590a0697cd7614c1c771e7be016cad45488f45e95416f231f20b45bd2e347128675424cda92d7b0107bd6f96b5851d867f686bf2ced37f69a4926c211e4a22e2e20e8e2ab277c35a5fd0b3703d36f6d0eb2f715209426b9a9dfec494d927a47782de46740a7b757ea88de19c05e8ac62de51899b6cab2d9e0b52f59cf393fa01df7e40a5eecc8e15cfde00a8d96dc93e57aef2370cf0340b3173857f6816d0132990b5049d2c00dc6c61c1184501e76c38d137bab3cc9725d4404c1c75eca5e91717e8c8780c3c5f5a6463816c7689c7add225e69043a04c67cc3c5f76fbfe919a998138b5cc0097aa3551f9e7f1973b7c3d0a923dfb853b964b0e4770cda6af0281809a70d2eeed3976d9fe7a920ba0ddc0a3c7f49987ea272a9cebfaeeb15dc8e41f26770af7e79e9327aa0576dadf6ce570707f13a27b3d10e7e147e2343b8307d0aefdde2668baf239540b46dd01a4905dc963a9baa199176eac3385dc93c3751ee22c6338bc8269920c35d16eabfdb599442af7d6e6bed5ca4b5cc9fdb3b0fff37792beab6ab4829f7a01c5c5214ee3d2ff0eff13842d88c44b52bfa9315e1575e906ca1cb66c1728e82274d376325cd64888364b6fb1d702c87b4116b80d1140dfa0eef8ab0a29153fd5221f16144e57637161e42d66cb163f665ac34e3fa3dfe5404d600d3f6e47d6fcf01447fc8b694b234401e4c184b296b32c3ee3f9d7b1bae4bec5e89698a319f092684eff268bd969fb20065487f87832190cd5c25661bc9ac4ed8382a8920ce46cf89be7e97ef1d75a4979b53079b98ba0d10c2b062cfc8d1cc1c7df32fe6127af49f9dae1bc93fd76aa547586a0e7b7f884360baa272a40776a811280d57018e0cb2422085e73f91f942ac7c826c141a7f9d5ff21834372a5f9dda42d6b7fd1794f7d1c1cf2c24b11284ffd20a3bec523a7a82fdd0d8477d15a7255e0f80281498f9561d0677e2b7264b9b430ac020fc7eb555479d0e0c4fdb5f3fd937308b127a4f50a96adac8bcd8c03fe00c509d3d023ff9554f34630ff77b30c6674efad30991afd31dbecd675589280c4edb0eccc033ed7b190067724216d46829cf8979a9877b4309165877be39a29e3b51905957b8066e8ee04e5a55b7b6bb70965eebbe1baa7e73df1ff3b105550bf080807e3fe9334682234bed7f2f3af062a61aa23dc4e4a359869f812575813ee7a6f2fce5e4c7b5b7c2d66ec63e4ca4f841a7ac29961f7ae721bc3c86291acaf6ccf5eca3e9309422ed67df00732beef722c381b8666ba70920257142137ed8b0eb26206b4d285eccaf0a1717ae2423775ae04a2244c388da6712d3172f38ac48d2c875edc520a7fb394e1632ee723473de1d37e72e80bedbefbd89ae473c9c7decfd1aedb54f4fe0e3f6b363841869d7ac7ce98f272e2675402454384a43cd1b1c6ae5661f830721ae2b7f22bc5aaa9ad1024bf42369aaefa183dc293d344484b183aae53a589f51031538027edc33e238a3b25ac90cfbd4c5f65cad3c14681f76fc0b10a205d87cd7e3e60484fc3979504f91b2bfb1f9db34579bfbbb378629ddd8de806d525fcf07d27bdfbedf0b7076b01981d5e730634e52986f3b86cc3c7b63486985bb8586a0ddfb14be53a3ebb503c5665257d88340630c76abc6338a8fecd0a28b16ce76c1f1e19db016aeced3661abff8fb44280c8664bc6f068e21e2ca788d830f65fb7e6e897b385745f34a60d5382ff5b68f3acb4768ef6af4a097e88cd54710a8f3130a1d27888a03446b049202bf870e6c05950938636622a5b3fea7640214ff0ebcbd49fb6d98534d3330f3eebc3c897f046541cace0f556acbdd70f1597af6a8ebe16f2b69166b850fc40dea35d3c36a19bffe08425ed8948f65b5e2441e4c3037c5fdc7de027ba71a4a05acc07523974a3f397f2c914b04781d1fd5903acafa42a6a9b2d0136155a35772560bb06b66178f90b5725d1a5d00d007d188346620b1a8b84015e6f7528b57216403f43f64a6a48f0069ba44247c3333bea9a8d9fbcf2dd22bb19c38d995221aa5872e7055064327671efefe45b1c04c0f87bea306fe6b4ca30903fecfd99ef41eacfdf697b7baf4b295f35e02f92704be68c418a3e719cbba94ce5227642990f340ee19c928844c2096514afe7a9b6fdf3b1e53bd661cbcb75c86dd7d860e10fc278aef66219fd4793409e12605b91eb91f6427c2cd2aa8303cf2832377f3b4af821846d666759fb657f59458821aa1c33975b4b750cd238210ac26850168e4dd107a838c549bfe381b9b1d98120fb0152fc796d1b2b961f5c9c73c2c16c411433f4b1a7c8e2edfe6e724a812e94e3cbcbe9b016e8b5f820f91b64f4300b32ac0de84092c271e45f4548df67e5e9677c379ec6117488cb9140c933394641df5e36093841e536b298d6347b606a263b287f7d6fd88378222d6462a6f64f5db4211e6b821f16986ca7839c5307a3311f879ca32849765b2cfa30649ef1306be9d670631476906f3806780c848d20444cc2c1a0f64ebcb1a120c3735201e54954b68da7f365033dac92bbdeab8c0380e8ba40b9d866dd4bb1b0cd079fd2b86eae14eaec5e3628e149387ab31a31b0c04d8fbb03b1b69d0739d18306b4a0f5d142d615a37d1ca4c6a0596e83341ea73b8dce6f20f894049ae875bc07ee850d905ee6c41b946ab47047420052f31f7f997c57abe25f4065ded4a38fd42a9a7d6f728628082052b2e8957c45e7a5acea8b6a57eef2ab440f214d623f6d03510b854333848ad73ab56820be5a557a7bbb183e3961e3b8dd6c4fd2df9a0c49d696e24c9be48633d1507c847a533508770450dacda565cd8d39a21d6e05f3117cbd154860c6e09972b4be4b3296d5a6e6b564a6d370fe03d1686d91f4203c991ee041eea435a9a646b2ee27130fb258ae1eea094c3177d8634bb707dc22fbcb", 0x1000}, {&(0x7f0000001640)="f2c1d38a1f2253e18c96da1002e8ce6529b995a02c769da7c49cf28560d590744acf819e9d", 0x25}, {&(0x7f0000001680)="3fe2c9433798b59b49accf3587fadf537d70911521dc5a0d7e894b4f471d175aad02e17cb65a194ee09f7cf0dc0797c03d5ef44b1228852a9fbae374783050c5a7bfd93a23e81ab3bb288ba61e8453955f8520b686084ff6c379d93b5e972b708dce04cf1bf14784710687962ffef7f3664b887d5ace173be7fc2c712d128a80bf594d4051e48d786a79ad1785959d1c86489c7d95b729398337fde8b5e5f78ffe1d0162b6e55af76624927ffe8df20efb7f4f8bfcc90eed2794c3dddca93fe8071b0667289c9d04441b6a6e21a4812abfd41c8b75b6a9a80bd20c28b8b397eefcb85f8b7976026eda457a5e77b26998ae0e86c73faff4193a4eff2af9b4a2070ce0cb15fe0aeef6d5c00d912294eb5bf4e1028db689999be59e625cdc7b60e2912a024df3cd685e8e67438b091f84f4a55eb3ae83562dd2bc8fb367dc3b3dbfa186976ffe2c5a36ebed499e7729e6eecde1915d41d7880f85fefea0499ba0f75cffde8e3abb26f7315048485c562b2f0a7644c1d60a765415cfed4cb1c369ab63ad8e88cf4eed96d46354d8548c52f05f94fcdd157c7f0be7ddffd61fa5e750041cc4e1643b6314c5ee8eebda602a07b14c7f40d0ba36667ca9581609d6c7a7771c3daae07745ca0666cd24c09586ab38dafaa174727233e790b74ef45575d1a6434e6fc07e2eadf9e6a0b18d8641d0901926657e8bf3c08422a5403f10251d57fa401d9ce595a97de1227028fc860b749dd4ec519828ce38c365423ac9db9e4a1bf412400f38b785eeeb94d4b5deab9a98072548be758e504f3bcdaa2c7365803c39c3b16c2492fc7624549353d8e5843e781dcfd4bdce81bb6ee83c176d25d09724c8f5f672d1bc5433869b29ef1e68ee15ff6a94c8a5807d9f8f6673b1d832ecf2fb1cf05956f491bfca544984a60a58f8a1b155798c51b8d8cc08a551faaf39ce1fc530303b3372831e5b723b47d524d24beab431268d9e29ec8205d1b7d6b51b9b31173ea86d0440871400c92ef3ff999878f8b22cc732d7fb374b154605851b4c8602eaddac95a83de39172fc1942c1e426eab7b1e5f6cf559785163fee927cdd4ad88259e417a1a3ce311f219da6863de7abd3bd3e40beff1968e58e267b05fd88ef9d6deaa23186e7bbf39b7266a76ac9e9b7448a9117a3486ba3da64f923809c4b2d50d3caaeb28013c4217307047872a6855fe0fca01d09365ae4c550537728bdca928f8e4c917c28736106d324db528f91586f1eb01001fb0b80486b3c09ccd3f2570cc408a9afea675737e59a765149c316e5a8f89c059209252da2c7f7cd0c8b64799b5650f6ee931fdb41960ff74e3fb5393213cdb9fc6a9847b3b30d0610ab6377d6e68643ae35dc2e1a77f2a6a76c53775a50f24b7eac2cdb828769e6658e87901b0a2c878a3b75da026230c9050dd1bbac6cc7e2cbe27618de2425208aff7c9f73e2a9b6c18cc78b6ed24d97813eff023c2dab7996d8963ddb5167b42c75d9230c657f94a0141d68211d796ffb2285fea2f026dc5d8c99dec1d567e8f797b02a2a42a429893c34f48b5ea20b8f0cb172780bedc2a5311b1cb424a05e084f0240026cc91a8f41cf829a3da510518c0255f4d1865a58c6be7dfbe564eb8b4717465ab385c5e0a7a6194f9184c7426143a64791b2d5224fe89470a94ce276dbc08c0afc8bf0de778e64a5bf96cb8bda0c1fe8839368631464b600098c066a20fb096cb9aef6a91ad3865cb31ea1cfb62ce016654cf9f58667c8201693e2fffe60e53725a43bcf24b784d42339be60f2df3f69e813d1d985ebaea9212860f94041443fcac73a1e12b79beb290eda51b18c1ac95f65af8779627da60a0464d629ab0342c442ac42c4cc95d674c95f67593c0cfb079dcaaae61aa3836da37c5ad9cf1aa6dfd4b74e5aa5dc9fa6fc529fa97ca7f980da2a3fc82ac67068a97a8ee8f0c9141cd91ee2c6cec2a2f10c4c31c68e43fe018632ff1d684b8897c694aebe77a5877bb9414ef339242465af4ea3cfd2a95efefbf169bb0ba03dd02dd0f592340e55f911c69944c3ef98e81bf267d5bcbc2d2805c24bc33cdfb71de754951d6a9b6b7a00bbdcc51b38dadc5c1c98c2901aba7dbbaa022a633ec26580f19427c2f0e8c01536614cbd4d639767dca615e308ddd42b3645f551594ccbf14549c46c7a96b9df0165f8612c45b81876a0af7974580d84c4a5b7596a4ef8301f85b52862014fa313e564a77df499b0abd129a106533410c0586f9f4e1d405b2fedefea5816288e28051fc11c06b437a88a2b957c866ec29f99c5728401c5c686511c49ef89a3369bb606539999bd002bb98deb2df6bf966ff77903a91309a639c10ae99aa87e9627471d8689680207c2b733bc1996ad5817cee8d1fbfa8c4da6e654f9fdec0327842d9daf96ffdfdbbcdca705ad1a42bcb7f7b5607814394624426a15bf29f74295041b46d61c5d2e38e198735e6df2d558819a42161e3fc7e763b008ebcd3f429b51a944b2cf472dc253d8ce0a829b95388649e02ef6af7addb766a2ee0569c40aadd35af718e3967c2056e355fe2a224216caae6235d1bf82969cb8e62d07042edf783db61d6d9a00d5b2953fc84d49989a4c2cc893877bafaa320ed92cf770e0e510f4737156febb21cd2f53402af968adf0cd6a3e2f1531e8cb70d4464ea9e1b251605ead0f9f1838de37134fef52be141983faa39d22d65565902ef2396bd833c30eda1ddd680d93fe17e5a14648400e61c109f70c7e619b864d63f96a65a77174c471a1f6deed5062fbf37dc62d674c576420ffa85a69a4cd7019c9f3619f7dc678036a218578ead0ad14c1b02a42b36c67ce6ee2f1ddf7593dfbda2633234bbbbe667bcd8d6ab6365967e9c930ab565c498182fd18225587e6230493622f7c4939781612a2e2b27422cf160b2b10cdeab3121500382c998af14fcffee5fe083102893e92ee574427b77363e9b1065842b7001b9d5f2e2798a27effde84aae5589a905ffb6322c58e3becae572eb5d63769403f629b487f8e48c60d1f2b5f600f1c132256a5b6e06240c8e1cb124e980cbbaf56de2f25cd60413862f3023722bc9778945449f400f76ce36302fac448d3122c1b780c56fc7d562d0d2f6e4e60cf7ec7be2fb4088d3102d4d1bb0aff6ce4f8c536677d300a99528596b461e46ea0f1fddd00d413f690fb67d85f63581881708c0c105a4783d46a569257d7725f39f6cfd175a4a910b473d4a8323d010b1db6b8f2c97473beb033456a114d5e4906f348615eb9f4ca5a350065c04b5ae5ddc14db15d36e44cc8334cc758a02f2b14c1cf6f443919c40de95e41a45667984a4820c8067a51074d1285b3a68502b09cf487484960b206f5a2241a94160af3c5869040dad81b88677c40557361dc89302e8224d5dfbb9e63e346f02f6242290f7152e4e2d93c5399486dd0e6f9f2c7d6c2d91df1de05d763a00a86ab8c9c844f842aff0f03f3270fd198dbd3e3e0d43d47848319332d242cd1975807971c3e2e39bcf7d3609dd4fd0549227a9cbc50cd42a5d5d680b50f41aca274e97376fdf29b949a00d62a7887beeea14438971c275c8d69751eed459aba0c9ddb98e5d42142eddb4fd6402f5e176c3e0dd9af75d08f58afd1b7c4d6baa4b00b97789ab6ae26f3f1bbc75ec23a74fef4c65fc8205de12b6e36d621b5faddf4fcf29b539c92e32fb1612130730208c38575c8a22257b0c3ee5671308761b5fb4ee452db5ff91e7784606cb53aed18a6b87dc493542c3e9da2e2bc8b8fab37924c81832fc63c4244825c01794690b2b344d52e6a742c98afe5d23a1e640a0cac5781ec51347fd6de767c1f069d79e29fe90b5671f51ee0e4266232c98162fb7fef0a89b9173e7d86e71f62b3bc6cf2dfb78367f82b5b415c139c89410014c6e71435c934c80b7d998405fb4d16507a0f9677219532946a2fe8e4f5d721e46b21f09b08806a2e53770675cc1b6b9cc8c83b0b29f8b552e8001d905863713233e927480d46936d96c6bf2c01c15e29403a656d7ce73ba7ab04f3c5cfbeeebda14c5e581f774a90eaee3cc97e59f62051704bd464fa8d9262b4a4560a32e5e6d7b1f6c376d3bfd90fa38d62ca30e1bba61f0d9c429be253417fd53e5536106fee7e6703d7a971167aeffad9c70854c2f8feebecb1af43870cb188bb76c6862feff3589b3dc6b5bc4d61b65f24416c7690bf52dc839dee29061f27d72e26fb409efc3400164a367baf20befe7ebb30fda351f251e613e946c0a25cc6db0116a0b3e20f1ac691079dad263eecd9dcda488296cd0e28900a8be49a8a630ad2b0b65b01bb2213a6e5b7bf693fecd71ce6f37c47f5d47cddbeb2b3d6913aa3f0473c3420d0d3286826ee0edfd47d2e2c61777c5663c4055d13d5136b9c40e210030acbb424d8e47ad9d63b4604c9f04746acab429196ef3b9ea61e54635ab6c3f3b02cee4be4ba381bcf803e047b963a90fd5215bed072eca44f31bf744426a0ea856cb2b78636f84a0846323b9d9c1870846ee345c7ccf7075242e926d1fa7d0331b7f4f086404d4126b7be13aaece9c98ff37468203d5f1d65803bb72790aca22172dea4a4b8e3960ca08b80938d691414e75679f8936b76751851037a8a0d666890efd37680ac502b8a42fe5e3f2191c954f7b73d853abda04d92f9780b3de7e7f5d918ba605c0fe16a5b16aa69a84c9255440c119308c5c59ce5cc71b5587ee2726c517f8d931b3b389af6f4ee605d391beca437cc54c3684a217c5ebe2e40285f918b2cf9ce69906f9871988df8617d1a622b466e170e4406242af9a1112cb1ce9cde99175a6af21e25c92f752260bb7968f975dc6f8b04d09dcf5cdf076dc4e67a5ecb16055a3a15f1eb760685c92ac0d120336d719ff50c39f80a5c8ad512d1cc3b643f1688f1407fb2a42af19d54a103c95581cddfa4da5b141ddcd2cfa040e937dff4fd392d090d9e8157716749417f7be6409a36d78c76c9d6c99dd803934e5a51a20582f165132acb83decf5e667cdc8425c4345cdd13fe7425c55181bdac93f5033af60b0203f21eba78b478a748b59b574e851601923245d065e8ea8f8a44235bca8474e65ae44a2ce656213465be379276dadbde9560d1f50400101b2a066ac8d3f1718e890e563b9977c3bf2d9fb4bd04594e2bf9fb7b6a3eaebc7fd5843fec53ceceae461002168704a8f8c3705b77d50d1dc9b05f6d20bc5e94dc493b22de035d99e4a51afd89417fe91a4a3f63292adb6ea6b131cd87098f95dfe5a904ad4748db3c1103e851a237815562622ba0debda645a4d969681ea2ca42ede7838e9d9d5fe3dfd7aa586dcf22b6ffb9a9cc984c6aec7d52c52242f7d4fcf905b1df8ba37c0ac71466ee3a2246e6d8162648a958c4da8ce425488610875357031dd267eaeb1af0bdeb5def5444f526ccd15421a07647ba2a82ca5d9a26574bed6d7fee5b26a28126bfaee579d0410982d88ed2409cc5ead56e58934ee71107dc3ee4e3a2641edcf39ff287cd5408d3688ca586743e0487021a9422806c9cd7e80010cde5c4aa41a36423b7d104018ce71848b1196ab47ab8c65b946a77154a42feee921146b7bfa44ecd7df67a8080800776a16ba8bb6103d92bca69de7aa676383192bb4a061749bfc6e887a9f70a2b171bbc8b4fff670ba4fa7e54051e34fc7a860bd0dccc0fd44f8bc9da1b323c63c3f219a26efcb23bb6b2c531b59c14cad0af26d3625cd8f3584aec6db7a51c2d73237e81afb603d270f0c44cf312223d553dd19b9944", 0x1000}], 0x9, &(0x7f0000002740), 0x0, 0x20000000}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000002800)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=0x4) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000060107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) r2 = memfd_create(&(0x7f0000002740)='*+wlan0-\x00', 0x3) write$P9_RSTAT(r2, &(0x7f00000027c0)={0x3d, 0x7d, 0x1, {0x0, 0x36, 0x7f, 0xc3, {0x0, 0x2}, 0x100000, 0x4, 0x9, 0x0, 0x1, '[', 0x2, '$\x00'}}, 0x3d) [ 231.486940] attempt to access beyond end of device [ 231.492243] loop0: rw=1, want=16769, limit=112 21:58:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded"], 0xd2) 21:58:17 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:17 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) ioctl(r3, 0x8912, &(0x7f0000001340)="025cc83d6d345f8f762070") 21:58:17 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) write$P9_RLERRORu(r0, &(0x7f0000000100)={0x1d, 0x7, 0x1, {{0x10, '/dev/sequencer2\x00'}, 0x5}}, 0x1d) renameat2(r0, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x4) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x5) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000380)=""/247, 0xf7) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c460000040000000000000000000000000000004000000010000000000000000000000000000000000038000000002a2a99e3b79b34880279ba5bb633c7ee1349b8eb8b7778a4fcd084aa769b9fa1e99fb217a01c771afd471ce7c3182974600000000000000000000000000000e61df1164544315a39030b3df697386944fece59d8697a11fb244b2153ee86b6aaaf4544bac7627dfaa3b39740f6c6649422f198cb025f7103547f7650c97813d3634e9654de6a16ffff995c4331ccb7ed30a939df0e29983610182611e03f51228b323e1288d01237d6777b8dbf29220e574858aab76c3151ddf2ad2c89d747d9f5"], 0x4a) 21:58:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:17 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000080)={0x1f}, 0x8) bind$bt_sco(r0, &(0x7f0000000100)={0x1f}, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3, 0x1000}, 0x4) 21:58:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:17 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:17 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x0) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "1cabe78754a539d39cabd6a40fa8c8aae3fa0000000000001c0525fec2541ebe2eb41f000000cabe9e068db78ce565aa9a9d325ebabd627afe7a54cdbd779b"}, 0x0) 21:58:17 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) socket$inet6(0xa, 0x1000000000002, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000180), &(0x7f0000000240)=0x60, 0x80000) 21:58:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0x3cd, &(0x7f0000000100)={&(0x7f0000000140)={0x24, 0x4000000000002, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x15, @u32}, @nested={0x8, 0x8, [@typed={0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 21:58:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000040)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@mcast1={0xff, 0x1, [0xf5ffffff], 0x1}, 0x5000000, 0x0, 0x102}, 0x20) 21:58:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf%\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:18 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x4}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000001c0)={'broute\x00', 0x0, 0x4, 0x36, [], 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f0000000180)=""/54}, &(0x7f0000000240)=0x78) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) unshare(0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f0000000440)=0x3, 0x4) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000000500)=0x101, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000480)='/dev/audio\x00', 0x2040, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, &(0x7f0000000080)=0x7fffffff) io_setup(0x1, &(0x7f00000004c0)) 21:58:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8000, 0x240880) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x20, 0x70bd26, 0x25dfdbfb, {0x3}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x0) gettid() r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x5cca) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000280)="66b94f0600000f320f9584aa8a440f20c0663508000000440f22c0d5fe66b9da0800000f32650f5ffa66b8592000000f23d00f21f866351000000b0f23f83e0f013bd9e166b92102000066b8ab340ccd66bad5ae4d710f30", 0x58}], 0x1, 0x0, &(0x7f0000000340), 0x0) 21:58:18 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) socket$inet6(0xa, 0x1000000000002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x480, 0x0) 21:58:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e15"], 0xf5) 21:58:18 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:18 executing program 4: openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) 21:58:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf\n\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r1, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:18 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r1, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000003, 0x1) unlink(&(0x7f0000000040)='./file0\x00') unshare(0x2000400) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = inotify_init() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000240)='.\x00', 0x80000002) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="e01582b9cedcb24384c73795b7540fe2ce98d9dd5ca95d4a049e79389bdeb27691153fb4a96c651279ddc236117058d6e9ff9ab1581ab3cf3fb0083e764bde55331db4c2389e20"], 0x1) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 21:58:18 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) fcntl$setsig(r1, 0xa, 0x7) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}, @empty, 0x2, 0x4, 0x20400000000, 0x500, 0x2, 0x100000, r3}) fchownat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 21:58:18 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) socket$inet6(0xa, 0x1000000000002, 0x0) 21:58:19 executing program 0: r0 = socket$inet6(0xa, 0x200000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xfffffffffffffbe2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000080)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xffffffffffffffff}, 0x14) accept$nfc_llcp(r2, &(0x7f0000000180), &(0x7f0000000040)=0x60) 21:58:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf-\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:19 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r1, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:19 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x181000, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xffffffffffffff00) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0xff, @rand_addr=0x20, 0x4e23, 0x0, 'dh\x00', 0x31, 0x1, 0x19}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x3, 0x6, 0x6, 0x162f3736}}, 0x44) dup2(r1, r2) 21:58:19 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) fcntl$addseals(r2, 0x409, 0x5) 21:58:19 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e15"], 0xf5) 21:58:19 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1a1400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f00000002c0)={{0x4}, {0x7f, 0xfffffffffffff800}, 0x8, 0x6, 0x6}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}) close(r3) close(r1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000040)) 21:58:19 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r1, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfx\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_cache\x00') socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) sendfile(r1, r0, &(0x7f0000000180), 0x80000002) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000300)={@multicast2, @local, 0x0}, &(0x7f0000000340)=0xc) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40020}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=@delpolicy={0x7c, 0x14, 0x4, 0x70bd27, 0x25dfdbfb, {{@in=@loopback=0x7f000001, @in=@broadcast=0xffffffff, 0x4e22, 0xf, 0x0, 0x0, 0xa, 0xa0, 0x20, 0x5c, r3, r4}, 0x6e6bbf, 0x3}, [@user_kmaddress={0x2c, 0x13, {@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6, 0x0, 0x2}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4004004}, 0x40000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 21:58:19 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x96}, 0x8) 21:58:19 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:19 executing program 0: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f00000000c0)=ANY=[]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$fiemap(r1, 0x6609, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r2, @ANYRESOCT, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES64=r2, @ANYPTR64, @ANYRES64=r1, @ANYRES64=r0], @ANYRES32]) 21:58:19 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:19 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0xffffffffffff8001) r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000)={0xfffffffffffffffd}, 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001280)=0xe8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001080)='/dev/vcs\x00', 0x80, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000012c0)) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000001380)=""/173) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000010c0)={{0x2, 0x4e20, @multicast2=0xe0000002}, {0x307, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1e}}, 0x0, {0x2, 0x4e22, @broadcast=0xffffffff}, 'teql0\x00'}) r3 = dup(r0) r4 = gettid() readv(r3, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) setsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000001300)="cfce9e65b76ac702b30b999b63ce785630a8726e4a9c796768501920110e65c1c91e7e158f6dc9abc0c8d432bb0626d762a802daf7dbb071043b3e95dc95ca6063cce2e67c760a20bbf2368691631dff3c43cf76440c03c74b3505da2435", 0x5e) tkill(r4, 0x16) 21:58:19 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r1, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:20 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:20 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r0, 0x4) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x42, &(0x7f0000000140)=r1, 0x4) delete_module(&(0x7f0000000000)='vmnet1md5sum#!uservboxnet1\x00', 0xa00) 21:58:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf*\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:20 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x400000fff) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2={0x1f}, 0x80}}, {{&(0x7f0000007500)=@hci={0x1f}, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 21:58:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e15"], 0xf5) 21:58:20 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r1, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:20 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000980)=""/230, 0xe6}], 0x1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r3, 0x400445a0, &(0x7f0000013000)) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000013000/0x1000)=nil, 0x1000}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) close(r2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x3ff, 0x4, [0x3, 0x100000001, 0x7, 0x0]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000380)={r5, 0xbe, "dc8442c8d353b2128ea691e2bb9691cfcc7e3ffbe0ded812e9f71ca3c0a635eb5019c9564001befbec4a0e3722fcd1e495d7afaa03f60f7f2265596964e6d8522bdee39e0389e657a419396e6acbb457aa64dfbf47b58873dbc5430ac407977989113732436805322577faaef29dd3b2f4b2c065c0912604825407dcb1cbefd650275df19ecc07423e3af75586990aa505ed8e653b676214bc6b732104e4b475a1f29c1a0980be9bc8db6eb5df97ab811134da0e237e9b1975011c84b06f"}, &(0x7f0000000200)=0xc6) 21:58:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:20 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000440)="025cc83d6d345f8f762070") r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) rt_sigqueueinfo(r2, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) ptrace(0x4208, r2) 21:58:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf+\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:20 executing program 4: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x8) r0 = shmget(0x1, 0x3000, 0x202, &(0x7f0000008000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/1) 21:58:20 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:20 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r1, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200000, 0x0) r1 = signalfd(r0, &(0x7f0000000100)={0x1}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = inotify_init1(0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400000200200000, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000080), 0x4) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f0000000040)=0x6) fcntl$getownex(r3, 0x24, &(0x7f000045fff8)) ioctl$TIOCSTI(r4, 0x5412, 0x5) pread64(r1, &(0x7f0000000180)=""/107, 0x6b, 0x0) 21:58:21 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x0, 0xe4, &(0x7f0000000080), &(0x7f0000000480)=""/228}, 0x28) 21:58:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") timer_create(0x3, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={&(0x7f0000000080), &(0x7f0000000100)}}, &(0x7f0000000140)) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) exit(0x0) timer_delete(0x0) 21:58:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfd\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:21 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:21 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) [ 235.516213] FAULT_FLAG_ALLOW_RETRY missing 30 [ 235.521483] CPU: 0 PID: 12510 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #143 [ 235.528875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.538257] Call Trace: [ 235.540882] dump_stack+0x1c9/0x2b4 [ 235.544522] ? dump_stack_print_info.cold.2+0x52/0x52 [ 235.549720] ? kasan_check_write+0x14/0x20 [ 235.553980] ? do_raw_spin_lock+0xc1/0x200 [ 235.558247] handle_userfault.cold.33+0x47/0x62 [ 235.562939] ? userfaultfd_ioctl+0x4fd0/0x4fd0 [ 235.567548] ? trace_hardirqs_on+0x10/0x10 [ 235.571994] ? perf_event_update_userpage+0xd30/0xd30 [ 235.577356] ? print_usage_bug+0xc0/0xc0 [ 235.581415] ? print_usage_bug+0xc0/0xc0 [ 235.585474] ? userfaultfd_ctx_put+0x810/0x810 [ 235.590064] ? find_held_lock+0x36/0x1c0 [ 235.594135] ? __lock_acquire+0x7fc/0x5020 [ 235.598375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.603141] ? graph_lock+0x170/0x170 [ 235.606956] ? find_held_lock+0x36/0x1c0 [ 235.611108] ? lock_downgrade+0x8f0/0x8f0 [ 235.615257] ? kasan_check_read+0x11/0x20 [ 235.619496] ? do_raw_spin_unlock+0xa7/0x2f0 [ 235.623891] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 235.628463] ? kasan_check_write+0x14/0x20 [ 235.632696] ? do_raw_spin_lock+0xc1/0x200 [ 235.636931] __handle_mm_fault+0x3a0a/0x4460 [ 235.641342] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 235.646261] ? graph_lock+0x170/0x170 [ 235.650074] ? lock_downgrade+0x8f0/0x8f0 [ 235.654221] ? kasan_check_read+0x11/0x20 [ 235.658370] ? rcu_is_watching+0x8c/0x150 [ 235.662508] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 235.666903] ? handle_mm_fault+0x8c4/0xc80 [ 235.671127] handle_mm_fault+0x53e/0xc80 [ 235.675183] ? __handle_mm_fault+0x4460/0x4460 [ 235.679776] ? find_vma+0x34/0x190 [ 235.683324] __do_page_fault+0x620/0xe50 [ 235.687378] ? mm_fault_error+0x380/0x380 [ 235.691532] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 235.696547] ? graph_lock+0x170/0x170 [ 235.700354] do_page_fault+0xf6/0x8c0 [ 235.704153] ? vmalloc_sync_all+0x30/0x30 [ 235.708318] ? find_held_lock+0x36/0x1c0 [ 235.712396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.717261] page_fault+0x1e/0x30 [ 235.720720] RIP: 0010:copy_user_generic_unrolled+0x9e/0xc0 [ 235.726322] Code: 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 <8a> 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f [ 235.745537] RSP: 0018:ffff88018d08f7f0 EFLAGS: 00010202 [ 235.750891] RAX: 0000000000000004 RBX: 0000000000000004 RCX: 0000000000000004 [ 235.758265] RDX: 0000000000000004 RSI: 0000000020013000 RDI: ffff88018d08f890 21:58:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x107) 21:58:22 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x7, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf50", &(0x7f0000000480)=""/228}, 0x28) [ 235.765522] RBP: ffff88018d08f828 R08: ffffed0031a11f13 R09: ffffed0031a11f12 [ 235.772865] R10: ffffed0031a11f12 R11: 0000000000000003 R12: 0000000020013004 [ 235.780145] R13: 0000000020013000 R14: ffff88018d08f890 R15: 00007ffffffff000 [ 235.787526] ? _copy_from_user+0x10d/0x150 [ 235.791769] evdev_do_ioctl+0xb69/0x21a0 [ 235.795831] ? lock_downgrade+0x8f0/0x8f0 [ 235.799972] ? str_to_user+0x90/0x90 [ 235.803689] ? do_futex+0x249/0x27d0 [ 235.807388] ? rcu_is_watching+0x8c/0x150 [ 235.811525] ? graph_lock+0x170/0x170 [ 235.815322] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 235.819730] ? find_held_lock+0x36/0x1c0 [ 235.823814] ? lock_downgrade+0x8f0/0x8f0 [ 235.827980] ? kasan_check_read+0x11/0x20 [ 235.832150] ? rcu_is_watching+0x8c/0x150 [ 235.836304] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 235.840759] ? __fget+0x414/0x670 [ 235.844236] evdev_ioctl_handler+0x144/0x1a0 [ 235.848658] evdev_ioctl+0x27/0x2e [ 235.852192] ? evdev_ioctl_compat+0x30/0x30 [ 235.856512] do_vfs_ioctl+0x1de/0x1720 [ 235.860395] ? rcu_is_watching+0x8c/0x150 [ 235.864529] ? ioctl_preallocate+0x300/0x300 [ 235.868934] ? __fget_light+0x2f7/0x440 [ 235.872948] ? fget_raw+0x20/0x20 [ 235.876447] ? putname+0xf2/0x130 [ 235.879944] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.885298] ? kmem_cache_free+0x25c/0x2d0 [ 235.889611] ? __x64_sys_futex+0x47f/0x6a0 [ 235.893925] ? do_futex+0x27d0/0x27d0 [ 235.898309] ? security_file_ioctl+0x94/0xc0 [ 235.902808] ksys_ioctl+0xa9/0xd0 [ 235.906424] __x64_sys_ioctl+0x73/0xb0 [ 235.910601] do_syscall_64+0x1b9/0x820 [ 235.914745] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.919844] ? syscall_return_slowpath+0x31d/0x5e0 [ 235.924943] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 235.930414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.935516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.941244] RIP: 0033:0x455a79 [ 235.944421] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.963607] RSP: 002b:00007fcb606f5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 235.971317] RAX: ffffffffffffffda RBX: 00007fcb606f66d4 RCX: 0000000000455a79 [ 235.978576] RDX: 0000000020013000 RSI: 00000000400445a0 RDI: 0000000000000015 [ 235.985848] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 235.993109] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 236.000372] R13: 00000000004bd192 R14: 00000000004cb970 R15: 0000000000000001 21:58:22 executing program 0: write(0xffffffffffffffff, &(0x7f00000000c0)="2400000024007f000000000000007701000000ff0100000000000100ffffffff0100ff10", 0x24) r0 = socket$inet(0x2, 0x3, 0x800000000000b) r1 = accept4(r0, &(0x7f0000000240)=@hci, &(0x7f0000000200)=0x80, 0x80000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000100)=""/182, &(0x7f00000001c0)=0xb6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x1f8, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000008060300736630000010006d793000000000000000000000696662300000000000000000000000006c6f0000000000000000000000000000ffffffffffff000000000000ff54a4225d064b0382e4cba043f2f794ffffffffff0000000000000000d00000000801000038010000617270000000000000000000000000000000000000000000000000000000000038000000000000000000000000000000e0000001000000007f00000100000000000000000000000000000000aaaaaaaaaa000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000fdffffff00000000726564697265637400000000000000000000000000000000000000000000000008d19ff41dc68d2830db7737"]}, 0x271) 21:58:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x1ff, {0x257b, 0x1, 0x53598098, 0x1000, 0x6, 0xfffffffffffffff8}, 0x3, 0xcfff}, 0xe) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = getegid() setgroups(0x4, &(0x7f0000000180)=[r2, r3, r4, r5]) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="170000001400350800000000000000000a001000", @ANYRES32=0x0, @ANYBLOB="14000100000000000000000000000000000000001400020000000000000000000000000000000000"], 0x40}, 0x1}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:58:22 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfc\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:22 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000efd000)=0x62) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)) r2 = syz_open_pts(r0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101001, 0x0) write$tun(r3, &(0x7f00000000c0)={@val={0x0, 0x9bff}, @void, @ipx={0xffff, 0x84, 0x5, 0x5, {@random=0x100000000, @current, 0x5}, {@broadcast=0xffffffff, @current, 0x80000001}, "0e14076e9e2aa5cecdb358078c5b5ebff7fb7fd166f8acdccb4993d85ccff578d2528321c413c6626718207adc505df5eb45a3a9f371287549073d3dcf3a4d37c8d10a1a55f0f9fc256f267e6743e90a17c2d4573bc5d3d1b5ba0a6745ace2556b0acee16dfc"}}, 0x88) ioctl$TIOCSETD(r2, 0x5412, &(0x7f00000004c0)=0x13) syz_open_pts(r3, 0x208000) 21:58:22 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xb, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822", &(0x7f0000000480)=""/228}, 0x28) 21:58:22 executing program 4: nanosleep(&(0x7f0000000140)={0x77359400}, &(0x7f00000002c0)) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8080, 0xa) futimesat(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={{0x77359400}, {0x77359400}}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x7ff) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000000)) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000480)={{0x400, 0xfff, 0x9, 0x2, 0x5, 0x1f}, 0xfffffffffffffff7, 0x10000, 0xce28, 0xffffffffffff5c0d, 0xa2f, "36da38864af70f8b79993b71ff1f7989f38e3baf64385cd2e948d71449e2aa8d23992fce2057b52c7e62c9bfab0bba8fa201b6a52acec76360726d7018a887bf9ed63c3d98b9dfbd9976a1f9ea36ae6ce6fdfc1ac135c7293a023e21801d15d34863c9d2f209b3b99df3a5d424b27d96d3ffe50ec0ee4f62d2038d3c2ff2af54"}) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000300)="35ba350cae4ddd10b8ea3ff85f6d357c817d0c9a6913d9477a45ecc3bb77f707f1ffa6fd6021ee36e8bfe680cc05cbb4c40c1406c45f53998c000db6ef40ea3c437cda748cdb477296baab", 0x4b) mremap(&(0x7f0000853000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x2}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000540)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000280)=0x2) accept$nfc_llcp(r0, &(0x7f0000000180), &(0x7f00000000c0)=0x60) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x9, 0x8075, 0xffffffffffffffff, 0x0) mlockall(0x3) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) [ 236.216406] kernel msg: ebtables bug: please report to author: Wrong len argument 21:58:22 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xd, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a", &(0x7f0000000480)=""/228}, 0x28) 21:58:22 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0xffff) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0xa, 0x4e21, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18cb834e5596630515000000070000000000000000000000180000000000ee00840000000500000000e1ffffff000000"], 0x30}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8002, 0xc0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000)=0x3b, 0x4) 21:58:22 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt(0xffffffffffffffff, 0x3, 0x40, &(0x7f0000000000)="2d3880e316229d0b21f584fc743d8a84a718381f77b2621db6085330b021d7f10baadca704fcb81c15a3b1d03f8552758cc98b14adb8e4ccfff4648e21fb1cac2af93b57076f6c38aa8b91cfad36f8a052eab408d0f43874c95d6e62016d46e9b60ba18f5951fb6efb9c0d37364b55e6b91f890c7f0a598cdee86369ad16eb77062e921385f6e0efc24b65c8691331a178eb915318823d30f2d26951584abb7e8651e00c26f61059b42e755a15e65144b5fa2b87e85b8222232ccda9e6894de96c530b4616a5376678e9b70678b54dc1", 0xd0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x39) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000100)=0x100000001, 0x1) sendto$unix(0xffffffffffffffff, &(0x7f0000000cc0), 0xe0, 0x0, &(0x7f0000000d00)=@abs, 0x6e) ioctl$sock_bt(r0, 0x8906, &(0x7f00000003c0)) [ 236.287314] kernel msg: ebtables bug: please report to author: Wrong len argument 21:58:22 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfp\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e1519fa00e8992aeed7d8eb67a4817b7e296359"], 0x107) 21:58:23 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x1}]}, &(0x7f0000000200)=0x10) listen(r0, 0x10000000ff) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000440)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000), 0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@int=0x2, 0x4) 21:58:23 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:23 executing program 7 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:23 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = getpgrp(0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000180)=0x68567bf1) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000001c0)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000013000/0x2000)=nil, 0x2000}, 0x1}) r3 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$llc_int(r4, 0x10c, 0x0, &(0x7f0000000040), &(0x7f0000000200)=0x4) setsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000240)=0x7, 0x4) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000013000)) ioctl$KVM_GET_EMULATED_CPUID(r4, 0xc008ae09, &(0x7f0000000300)=""/241) close(r1) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="070000000000bfc30000000000000000", @ANYRES64=0x0, @ANYRES64=0x7530, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000d300692ddfae1e24"], 0x48}, 0x1}, 0x0) 21:58:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfX\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 237.010203] FAULT_INJECTION: forcing a failure. [ 237.010203] name failslab, interval 1, probability 0, space 0, times 0 [ 237.021809] CPU: 0 PID: 12600 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 237.029181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.038549] Call Trace: [ 237.041163] dump_stack+0x1c9/0x2b4 [ 237.044812] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.050020] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 237.054895] should_fail.cold.4+0xa/0x1a 21:58:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 237.058981] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.064136] ? lock_downgrade+0x8f0/0x8f0 [ 237.068318] ? find_held_lock+0x36/0x1c0 [ 237.072419] ? check_same_owner+0x340/0x340 [ 237.076771] ? rcu_note_context_switch+0x730/0x730 [ 237.081740] __should_failslab+0x124/0x180 [ 237.086025] should_failslab+0x9/0x14 [ 237.089841] __kmalloc+0x2c8/0x760 [ 237.093405] ? __fget_light+0x2f7/0x440 [ 237.097417] ? bpf_test_init.isra.8+0x98/0x100 [ 237.102024] bpf_test_init.isra.8+0x98/0x100 [ 237.106456] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 237.111313] bpf_prog_test_run_skb+0x103/0xa30 [ 237.115930] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 237.120806] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 237.126354] ? fput+0x130/0x1a0 [ 237.129650] ? __bpf_prog_get+0x9b/0x290 [ 237.133734] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 237.138583] bpf_prog_test_run+0x130/0x1a0 [ 237.142830] __x64_sys_bpf+0x3d8/0x510 [ 237.146710] ? bpf_prog_get+0x20/0x20 [ 237.150502] ? do_syscall_64+0x9a/0x820 [ 237.154469] do_syscall_64+0x1b9/0x820 [ 237.158344] ? finish_task_switch+0x1d3/0x870 [ 237.162846] ? syscall_return_slowpath+0x5e0/0x5e0 [ 237.167795] ? syscall_return_slowpath+0x31d/0x5e0 [ 237.172744] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 237.178126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.182994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.188184] RIP: 0033:0x455a79 [ 237.191361] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.210567] RSP: 002b:00007effc88a8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 237.218381] RAX: ffffffffffffffda RBX: 00007effc88a96d4 RCX: 0000000000455a79 [ 237.225837] RDX: 0000000000000028 RSI: 0000000020000300 RDI: 000000000000000a [ 237.233136] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 237.240606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 237.247884] R13: 00000000004bb6df R14: 00000000004c8ac0 R15: 0000000000000000 21:58:23 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:23 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff}) fanotify_mark(r0, 0x10, 0x802402b, r0, &(0x7f0000000080)='./file0\x00') syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2000000000000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000140)={0x7, 0x1e}) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="5472e62b67d6386516ab32e6ad7508a9ddb4aa77af5e0a6d70fa4dbc3c60ad2fd7baf3167aae"]) r1 = syz_open_procfs(0x0, &(0x7f0000000580)='net/ip6_tables_targets\x00') mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) write$eventfd(r0, &(0x7f0000000180)=0xffffffff, 0x8) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000001c0)=0x4, 0x2) 21:58:23 executing program 1: unshare(0x20000400) mkdir(&(0x7f0000b8f000)='./file0\x00', 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000b99e7d)='./file0\x00', 0x8) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='efivarfs\x00', 0x40, &(0x7f00000000c0)="836a1c400921bd68dfd3cbf310d29de9b0b5b41fab157e66d690cc44d9e6bebec19e3462a5f55a99a8b5c925bcf9d0411c2c879026ffa25e3da38f0323630d726fe788a618e0bae1b9b168c04e201049a13e680445afb1da45d734ac92d6bfbab22d8162cf724cf9dcf5da541c4887224cce3f52d0e1f8cd23f9eec57667956c1587c8aa02162e106db88f4b4841cf14403e07f9c9671f98e93a92420725361b3c1d20463552ac4ddc46e62ffadd15985fe0a90987137aa64732f1dc6689899329050b08584143ea1707c26883973dc0a2b6d2931aa5bfa31b") r2 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000240)='vmnet0/\x00', 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x8) r3 = msgget$private(0x0, 0x22) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000280)=""/26) inotify_rm_watch(r0, r1) 21:58:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:23 executing program 7 (fault-call:1 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfu\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:23 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x84600, 0x0) read$FUSE(r0, &(0x7f00000000c0), 0x1000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:58:23 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) [ 237.673851] FAULT_INJECTION: forcing a failure. [ 237.673851] name failslab, interval 1, probability 0, space 0, times 0 [ 237.685181] CPU: 1 PID: 12637 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 237.688897] FAT-fs (loop4): Unrecognized mount option "Træ+gÖ8e«2æ­u©Ý´ªw¯^ [ 237.688897] mpúM¼<`­/׺óz®" or missing value [ 237.692637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.692646] Call Trace: [ 237.692675] dump_stack+0x1c9/0x2b4 [ 237.692699] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.692721] ? kasan_check_read+0x11/0x20 [ 237.692749] should_fail.cold.4+0xa/0x1a [ 237.733648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.738791] ? is_bpf_text_address+0xd7/0x170 [ 237.743289] ? kernel_text_address+0x79/0xf0 [ 237.747782] ? __kernel_text_address+0xd/0x40 [ 237.752285] ? unwind_get_return_address+0x61/0xa0 [ 237.757747] ? __save_stack_trace+0x8d/0xf0 [ 237.762085] ? save_stack+0xa9/0xd0 [ 237.765712] ? save_stack+0x43/0xd0 [ 237.769415] ? kasan_kmalloc+0xc4/0xe0 [ 237.773294] ? bpf_test_init.isra.8+0x98/0x100 [ 237.777880] ? bpf_prog_test_run_skb+0x103/0xa30 [ 237.782627] ? graph_lock+0x170/0x170 [ 237.786693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.792055] ? kasan_check_read+0x11/0x20 [ 237.796298] ? find_held_lock+0x36/0x1c0 [ 237.800355] __should_failslab+0x124/0x180 [ 237.805930] should_failslab+0x9/0x14 [ 237.809721] kmem_cache_alloc+0x47/0x760 [ 237.813788] ? kasan_unpoison_shadow+0x35/0x50 [ 237.818364] __build_skb+0xab/0x430 [ 237.821986] ? skb_try_coalesce+0x1c90/0x1c90 [ 237.826476] ? __check_object_size+0x9d/0x5f2 [ 237.831153] build_skb+0x77/0x2f0 [ 237.834599] ? __build_skb+0x430/0x430 [ 237.838481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.844010] ? bpf_test_init.isra.8+0x70/0x100 [ 237.848591] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 237.853424] bpf_prog_test_run_skb+0x1ae/0xa30 [ 237.858028] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 237.863048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 237.868579] ? fput+0x130/0x1a0 [ 237.871861] ? __bpf_prog_get+0x9b/0x290 [ 237.876027] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 237.881905] bpf_prog_test_run+0x130/0x1a0 [ 237.886232] __x64_sys_bpf+0x3d8/0x510 [ 237.890115] ? bpf_prog_get+0x20/0x20 [ 237.893914] ? do_syscall_64+0x9a/0x820 [ 237.897971] do_syscall_64+0x1b9/0x820 [ 237.901850] ? finish_task_switch+0x1d3/0x870 [ 237.906338] ? syscall_return_slowpath+0x5e0/0x5e0 [ 237.911351] ? syscall_return_slowpath+0x31d/0x5e0 [ 237.916292] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 237.921666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.926542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.931734] RIP: 0033:0x455a79 [ 237.934921] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.954611] RSP: 002b:00007effc88a8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 237.962493] RAX: ffffffffffffffda RBX: 00007effc88a96d4 RCX: 0000000000455a79 [ 237.969756] RDX: 0000000000000028 RSI: 0000000020000300 RDI: 000000000000000a [ 237.977029] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 237.984297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 237.991556] R13: 00000000004bb6df R14: 00000000004c8ac0 R15: 0000000000000001 [ 238.021184] 9pnet: Insufficient options for proto=fd [ 238.064957] FAT-fs (loop4): Unrecognized mount option "Træ+gÖ8e«2æ­u©Ý´ªw¯^ [ 238.064957] mpúM¼<`­/׺óz®" or missing value 21:58:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x107) 21:58:24 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x40045564, 0x0) 21:58:24 executing program 7 (fault-call:1 fault-nth:2): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:24 executing program 1: r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000340)={0x0, 0xf6f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000003c0)={r1, 0x100000001}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000000)="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") r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) ppoll(&(0x7f0000000180)=[{r3, 0x790}, {r5, 0x20}, {r2, 0x2}, {r2, 0x1100}, {r4, 0x4102}], 0x5, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f0000000200)={0x9}, 0x8) socket$nl_route(0x10, 0x3, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) sendmmsg$alg(r5, &(0x7f00000008c0), 0x2aa, 0x0) 21:58:24 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 238.202591] 9pnet: Insufficient options for proto=fd 21:58:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") open$dir(&(0x7f0000000040)='./file0\x00', 0x151800, 0x82) r1 = shmget(0x1, 0x2000, 0x54000014, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000080)=""/252) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_xen(&(0x7f0000003e80)='cgroup\x00', &(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)='9p\x00', 0x20, &(0x7f0000000040)=ANY=[]) chroot(&(0x7f00000001c0)='./file0/../file0\x00') ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000002c0)="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") r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x400, 0x0) fallocate(r0, 0x2, 0x7, 0xfffffffffffffff7) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000240)=0x81, 0x4) 21:58:24 executing program 4: r0 = socket$inet6(0xa, 0x804, 0x7) ioctl(r0, 0xa67e, &(0x7f0000000280)="025cc83d6d345f8f762070") accept4(r0, &(0x7f0000000000)=@pppol2tp, &(0x7f0000000080)=0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fda000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000200)="c4c255961eb805000000b9002000000f01d966b841008ed866baf80cb89da1d281ef66bafc0cecdc070f20c035000000800f22c0b8010000000f01c1440f20c0350c000000440f22c066b828000f00d0c4c10158db", 0x55}], 0xc, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae42, &(0x7f0000000140)={0x0, 0x0, 0x705000, 0x1000, &(0x7f0000fde000/0x1000)=nil}) [ 238.316501] FAULT_INJECTION: forcing a failure. [ 238.316501] name failslab, interval 1, probability 0, space 0, times 0 [ 238.327920] CPU: 1 PID: 12694 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 238.335299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.344669] Call Trace: [ 238.347280] dump_stack+0x1c9/0x2b4 [ 238.350931] ? dump_stack_print_info.cold.2+0x52/0x52 [ 238.356158] should_fail.cold.4+0xa/0x1a [ 238.360251] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.365476] ? lock_downgrade+0x8f0/0x8f0 [ 238.369652] ? print_usage_bug+0xc0/0xc0 [ 238.373748] ? kasan_check_read+0x11/0x20 [ 238.377915] ? rcu_is_watching+0x8c/0x150 [ 238.382075] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 238.386495] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 238.390917] ? find_held_lock+0x36/0x1c0 [ 238.395003] ? trace_hardirqs_on+0x10/0x10 [ 238.399260] ? __lock_acquire+0x7fc/0x5020 [ 238.403512] ? unwind_get_return_address+0x61/0xa0 [ 238.408475] ? __save_stack_trace+0x8d/0xf0 [ 238.412817] __should_failslab+0x124/0x180 [ 238.417061] should_failslab+0x9/0x14 [ 238.420882] kmem_cache_alloc+0x47/0x760 [ 238.424950] ? save_stack+0x43/0xd0 [ 238.428576] ? kasan_kmalloc+0xc4/0xe0 [ 238.432455] ? kasan_slab_alloc+0x12/0x20 [ 238.436597] ? kmem_cache_alloc+0x12e/0x760 [ 238.440924] ? __build_skb+0xab/0x430 [ 238.444714] ? build_skb+0x77/0x2f0 [ 238.448337] skb_clone+0x1f5/0x500 [ 238.451871] ? skb_split+0x11f0/0x11f0 [ 238.455772] bpf_clone_redirect+0xb9/0x490 [ 238.460009] bpf_prog_bebbfe2050753572+0x708/0x1000 [ 238.465036] ? lock_downgrade+0x8f0/0x8f0 [ 238.469178] ? rcu_pm_notify+0xc0/0xc0 [ 238.473070] ? pvclock_read_flags+0x160/0x160 [ 238.477559] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.482566] ? kmem_cache_alloc+0x5fa/0x760 [ 238.486882] ? lock_acquire+0x1e4/0x540 [ 238.490846] ? bpf_test_run+0x1f3/0x3b0 [ 238.494817] ? kasan_check_read+0x11/0x20 [ 238.498952] ? rcu_is_watching+0x8c/0x150 [ 238.503138] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 238.507557] ? bpf_test_run+0xaf/0x3b0 [ 238.511446] ? bpf_prog_test_run_skb+0x62a/0xa30 [ 238.516202] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 238.521055] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 238.526583] ? fput+0x130/0x1a0 [ 238.529857] ? __bpf_prog_get+0x9b/0x290 [ 238.533912] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 238.538743] ? bpf_prog_test_run+0x130/0x1a0 [ 238.543144] ? __x64_sys_bpf+0x3d8/0x510 [ 238.547195] ? bpf_prog_get+0x20/0x20 [ 238.550993] ? do_syscall_64+0x9a/0x820 [ 238.554983] ? do_syscall_64+0x1b9/0x820 [ 238.559132] ? syscall_slow_exit_work+0x500/0x500 21:58:24 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 238.563982] ? syscall_return_slowpath+0x5e0/0x5e0 [ 238.570089] ? syscall_return_slowpath+0x31d/0x5e0 [ 238.575025] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 238.580406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.585253] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:58:24 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x4) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f00000002c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x10004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000040)="670f01f8c42249dfa900700000b9800000c00f3235000100000f300fbdc5c481da58d8400f9fba00000000c4e2f5370500300000470f093e660f130a66360fba7a0028", 0x43}], 0x1, 0x0, &(0x7f0000000140), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000014000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f0000000200)="13d83664650fc7ab08000fc76d430f080f01cb0f01df2e0c77baf80c66b8a9cf9b8466efbafc0cec2e262e0feb73120f20d86635200000000f22d8", 0x3b}], 0x1, 0x0, &(0x7f0000000300)=[@efer={0x2, 0x6000}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:58:24 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:25 executing program 7 (fault-call:1 fault-nth:3): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 238.845448] FAULT_INJECTION: forcing a failure. [ 238.845448] name failslab, interval 1, probability 0, space 0, times 0 [ 238.857156] CPU: 1 PID: 12739 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 238.864549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.873911] Call Trace: [ 238.876526] dump_stack+0x1c9/0x2b4 [ 238.880265] ? dump_stack_print_info.cold.2+0x52/0x52 [ 238.885473] ? print_usage_bug+0xc0/0xc0 [ 238.889562] should_fail.cold.4+0xa/0x1a [ 238.893642] ? graph_lock+0x170/0x170 [ 238.897468] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.902687] ? find_held_lock+0x36/0x1c0 [ 238.906782] ? lock_downgrade+0x8f0/0x8f0 [ 238.910973] ? kasan_check_read+0x11/0x20 [ 238.915572] ? do_raw_spin_unlock+0xa7/0x2f0 [ 238.920008] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 238.924888] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 238.929993] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.935013] __should_failslab+0x124/0x180 [ 238.939262] should_failslab+0x9/0x14 [ 238.943069] kmem_cache_alloc_node_trace+0x5a/0x770 [ 238.948075] ? save_stack+0xa9/0xd0 [ 238.951691] ? save_stack+0x43/0xd0 [ 238.955317] ? kasan_kmalloc+0xc4/0xe0 [ 238.959204] ? kasan_slab_alloc+0x12/0x20 [ 238.963351] ? kmem_cache_alloc+0x12e/0x760 [ 238.967681] __kmalloc_node_track_caller+0x33/0x70 [ 238.972606] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 238.977361] ? kasan_check_read+0x11/0x20 [ 238.981504] pskb_expand_head+0x228/0x10e0 [ 238.985730] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 238.990132] ? find_held_lock+0x36/0x1c0 [ 238.994185] ? graph_lock+0x170/0x170 [ 238.997979] ? __pskb_copy_fclone+0xea0/0xea0 [ 239.002475] ? memcpy+0x45/0x50 [ 239.005744] ? __copy_skb_header+0x32f/0x550 [ 239.010142] ? sock_spd_release+0x2e0/0x2e0 [ 239.014464] ? __lock_is_held+0xb5/0x140 [ 239.018518] ? kasan_check_write+0x14/0x20 [ 239.022750] ? __skb_clone+0x6a7/0x9e0 [ 239.026637] ? __copy_skb_header+0x550/0x550 [ 239.031036] ? save_stack+0x43/0xd0 [ 239.034649] ? kasan_kmalloc+0xc4/0xe0 [ 239.038531] ? kasan_slab_alloc+0x12/0x20 [ 239.042674] ? kmem_cache_alloc+0x12e/0x760 [ 239.046985] skb_ensure_writable+0x3dd/0x640 [ 239.051395] ? skb_cow_data+0xf20/0xf20 [ 239.055376] bpf_clone_redirect+0x14a/0x490 [ 239.059710] bpf_prog_bebbfe2050753572+0x330/0x1000 [ 239.064726] ? lock_downgrade+0x8f0/0x8f0 [ 239.068875] ? rcu_pm_notify+0xc0/0xc0 [ 239.072759] ? pvclock_read_flags+0x160/0x160 [ 239.077242] ? rcu_read_lock_sched_held+0x108/0x120 [ 239.082259] ? kmem_cache_alloc+0x5fa/0x760 [ 239.086582] ? lock_acquire+0x1e4/0x540 [ 239.090548] ? bpf_test_run+0x1f3/0x3b0 [ 239.094529] ? kasan_check_read+0x11/0x20 [ 239.098925] ? rcu_is_watching+0x8c/0x150 [ 239.103145] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 239.107561] ? bpf_test_run+0xaf/0x3b0 [ 239.111444] ? bpf_prog_test_run_skb+0x62a/0xa30 [ 239.116197] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 239.121039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.126582] ? fput+0x130/0x1a0 [ 239.129858] ? __bpf_prog_get+0x9b/0x290 [ 239.133909] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 239.138825] ? bpf_prog_test_run+0x130/0x1a0 [ 239.143236] ? __x64_sys_bpf+0x3d8/0x510 [ 239.147284] ? bpf_prog_get+0x20/0x20 [ 239.151079] ? do_syscall_64+0x9a/0x820 [ 239.155048] ? do_syscall_64+0x1b9/0x820 [ 239.159096] ? finish_task_switch+0x1d3/0x870 [ 239.163592] ? syscall_return_slowpath+0x5e0/0x5e0 [ 239.168533] ? syscall_return_slowpath+0x31d/0x5e0 [ 239.173456] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 239.178821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.183665] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.218662] *** Guest State *** [ 239.222068] CR0: actual=0x0000000080000031, shadow=0x00000000e0000011, gh_mask=fffffffffffffff7 [ 239.231115] CR4: actual=0x0000000000002060, shadow=0x0000000000000020, gh_mask=ffffffffffffe871 [ 239.240006] CR3 = 0x0000000000002000 [ 239.243788] PDPTR0 = 0x0000000000003007 PDPTR1 = 0x0000000000000000 [ 239.250308] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 239.256845] RSP = 0x0000000000000f80 RIP = 0x000000000000000b [ 239.262838] RFLAGS=0x00000086 DR7 = 0x0000000000000400 [ 239.269276] Sysenter RSP=0000000000000f80 CS:RIP=0050:0000000000002810 [ 239.275971] CS: sel=0x0000, attr=0x0409b, limit=0x000fffff, base=0x0000000000000000 [ 239.283989] DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 239.291997] SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 239.300043] ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 239.308083] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 239.316109] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 239.324109] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 239.332149] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 239.340178] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 239.348237] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 239.356257] EFER = 0x0000000000000000 PAT = 0x0007040600070406 21:58:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x110) 21:58:25 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r1, &(0x7f0000000040), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000201fface70400865323720700000207"], 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x6) 21:58:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfi\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:25 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='vxfs\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file0\x00') getrandom(&(0x7f0000000000)=""/21, 0x15, 0x2) 21:58:25 executing program 7 (fault-call:1 fault-nth:4): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 239.362767] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 239.370268] Interruptibility = 00000000 ActivityState = 00000000 [ 239.376543] *** Host State *** [ 239.380046] RIP = 0xffffffff811f4664 RSP = 0xffff88019044f350 [ 239.386083] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 239.392537] FSBase=00007fcb60717700 GSBase=ffff8801daf00000 TRBase=fffffe0000034000 [ 239.400422] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 239.406344] CR0=0000000080050033 CR3=00000001b1350000 CR4=00000000001426e0 [ 239.413435] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87a01380 [ 239.420151] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 239.426260] *** Control State *** [ 239.429755] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 239.430729] FAULT_INJECTION: forcing a failure. [ 239.430729] name failslab, interval 1, probability 0, space 0, times 0 [ 239.436465] EntryControls=0000d1ff ExitControls=0023efff [ 239.436480] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 239.436489] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 239.436498] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 239.436506] reason=80000021 qualification=0000000000000002 [ 239.436511] IDTVectoring: info=00000000 errcode=00000000 [ 239.436516] TSC Offset = 0xffffff7c88c7f4ee [ 239.436523] EPT pointer = 0x00000001c8a2101e [ 239.495088] CPU: 0 PID: 12753 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 239.502493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.511863] Call Trace: [ 239.514469] dump_stack+0x1c9/0x2b4 21:58:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x5000aea5, &(0x7f00000000c0)=ANY=[]) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a30fbcc788a4d2414b304aaaa8473b5a2eedafb60d66f8a76c1718691c8988dbea21a1c5dc8"], 0x36) 21:58:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 239.518137] ? dump_stack_print_info.cold.2+0x52/0x52 [ 239.523335] ? __lock_acquire+0x7fc/0x5020 [ 239.527598] should_fail.cold.4+0xa/0x1a [ 239.531688] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.536820] ? rb_erase_cached+0xc82/0x32c0 [ 239.541180] ? rb_next+0x140/0x140 [ 239.544743] ? __lock_acquire+0x7fc/0x5020 [ 239.548993] ? print_usage_bug+0xc0/0xc0 [ 239.553073] ? print_usage_bug+0xc0/0xc0 [ 239.557326] ? __lock_acquire+0x7fc/0x5020 [ 239.561588] ? print_usage_bug+0xc0/0xc0 [ 239.565800] ? print_usage_bug+0xc0/0xc0 21:58:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)={0x7b9}) ioctl$KVM_GET_PIT2(r2, 0xae71, &(0x7f0000000340)) [ 239.569894] __should_failslab+0x124/0x180 [ 239.574261] should_failslab+0x9/0x14 [ 239.578070] kmem_cache_alloc_node_trace+0x5a/0x770 [ 239.583096] ? __lock_acquire+0x7fc/0x5020 [ 239.587360] ? __lock_acquire+0x7fc/0x5020 [ 239.591617] __kmalloc_node_track_caller+0x33/0x70 [ 239.596596] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 239.601554] pskb_expand_head+0x228/0x10e0 [ 239.605806] ? print_usage_bug+0xc0/0xc0 [ 239.609898] ? __pskb_copy_fclone+0xea0/0xea0 [ 239.614407] ? print_usage_bug+0xc0/0xc0 [ 239.618486] ? trace_hardirqs_on+0x10/0x10 [ 239.622724] ? __update_load_avg_blocked_se.isra.33+0x460/0x460 [ 239.628788] ? graph_lock+0x170/0x170 [ 239.632604] ? graph_lock+0x170/0x170 [ 239.636412] ? graph_lock+0x170/0x170 [ 239.640216] ? graph_lock+0x170/0x170 [ 239.644023] ? find_held_lock+0x36/0x1c0 [ 239.648089] ipgre_xmit+0x677/0xb50 [ 239.651712] ? gre_tap_xmit+0x590/0x590 [ 239.655681] ? __lock_is_held+0xb5/0x140 [ 239.659746] dev_hard_start_xmit+0x26c/0xc30 [ 239.664165] ? dev_direct_xmit+0x6b0/0x6b0 [ 239.668410] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.674024] ? netif_skb_features+0x690/0xb70 [ 239.678602] ? validate_xmit_xfrm+0x1ef/0xdc0 [ 239.683087] ? lock_acquire+0x1e4/0x540 [ 239.687054] ? validate_xmit_skb+0x80c/0xf30 [ 239.691457] ? netif_skb_features+0xb70/0xb70 [ 239.695949] __dev_queue_xmit+0x29ef/0x3910 [ 239.700255] ? pskb_expand_head+0x228/0x10e0 [ 239.704660] ? skb_ensure_writable+0x3dd/0x640 [ 239.709239] ? bpf_clone_redirect+0x14a/0x490 [ 239.713731] ? bpf_prog_bebbfe2050753572+0x9df/0x1000 [ 239.719100] ? netdev_pick_tx+0x2d0/0x2d0 [ 239.723237] ? check_memory_region+0x100/0x1b0 [ 239.727819] ? do_raw_spin_unlock+0xa7/0x2f0 [ 239.732236] ? __lock_is_held+0xb5/0x140 [ 239.736309] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 239.741322] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 239.746329] ? skb_release_data+0x1c4/0x880 [ 239.750729] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 239.755995] ? kasan_unpoison_shadow+0x35/0x50 [ 239.760571] ? skb_tx_error+0x2f0/0x2f0 [ 239.764537] ? kasan_kmalloc+0xc4/0xe0 [ 239.768416] ? __kmalloc_node_track_caller+0x47/0x70 [ 239.773512] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 239.779045] ? kasan_check_write+0x14/0x20 [ 239.783268] ? pskb_expand_head+0x6b2/0x10e0 [ 239.787668] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 239.792083] ? find_held_lock+0x36/0x1c0 [ 239.796150] ? __pskb_copy_fclone+0xea0/0xea0 [ 239.800641] ? memcpy+0x45/0x50 [ 239.803933] ? sock_spd_release+0x2e0/0x2e0 [ 239.808263] ? kasan_check_write+0x14/0x20 [ 239.812497] ? __skb_clone+0x6a7/0x9e0 [ 239.816375] ? __copy_skb_header+0x550/0x550 [ 239.820782] ? save_stack+0x43/0xd0 [ 239.824396] ? kasan_slab_alloc+0x12/0x20 [ 239.828538] ? kmem_cache_alloc+0x12e/0x760 [ 239.832861] ? skb_ensure_writable+0x15e/0x640 [ 239.837437] dev_queue_xmit+0x17/0x20 [ 239.841223] ? dev_queue_xmit+0x17/0x20 [ 239.845186] __bpf_redirect+0x5b7/0xae0 [ 239.849157] bpf_clone_redirect+0x2f6/0x490 [ 239.853476] bpf_prog_bebbfe2050753572+0x9df/0x1000 [ 239.858483] ? lock_downgrade+0x8f0/0x8f0 [ 239.862618] ? rcu_pm_notify+0xc0/0xc0 [ 239.866500] ? pvclock_read_flags+0x160/0x160 [ 239.870995] ? rcu_read_lock_sched_held+0x108/0x120 [ 239.876008] ? kmem_cache_alloc+0x5fa/0x760 [ 239.880337] ? lock_acquire+0x1e4/0x540 [ 239.884299] ? bpf_test_run+0x1f3/0x3b0 [ 239.888273] ? kasan_check_read+0x11/0x20 [ 239.892405] ? rcu_is_watching+0x8c/0x150 [ 239.896542] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 239.900968] ? bpf_test_run+0xaf/0x3b0 [ 239.904857] ? bpf_prog_test_run_skb+0x62a/0xa30 [ 239.909616] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 239.914444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.919968] ? fput+0x130/0x1a0 [ 239.923235] ? __bpf_prog_get+0x9b/0x290 [ 239.927286] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 239.932116] ? bpf_prog_test_run+0x130/0x1a0 [ 239.936513] ? __x64_sys_bpf+0x3d8/0x510 [ 239.940563] ? bpf_prog_get+0x20/0x20 [ 239.944360] ? do_syscall_64+0x9a/0x820 [ 239.948328] ? do_syscall_64+0x1b9/0x820 [ 239.952387] ? finish_task_switch+0x1d3/0x870 [ 239.956871] ? syscall_return_slowpath+0x5e0/0x5e0 [ 239.961792] ? syscall_return_slowpath+0x31d/0x5e0 [ 239.966810] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 239.972173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.977026] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:58:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:26 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r1, &(0x7f0000000040), 0x8008) setsockopt$inet6_int(r2, 0x29, 0xdd, &(0x7f0000000080)=0x9, 0x4) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f00000000c0)={0xffff, 0x0, 0x18, 0x0, 0x5f, 0x3}) 21:58:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfl\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:26 executing program 7 (fault-call:1 fault-nth:5): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:26 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:27 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:27 executing program 0: r0 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x4, 0x1f, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000180)=""/31}, &(0x7f0000000240)=0x78) sendfile(r0, r0, &(0x7f0000317000), 0xff8) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x7, 0x0, 0x4, 0x8, 0x1719c2e7}) 21:58:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x110) 21:58:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jf#\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:27 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x5) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000007c0)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000800)={0x0, 0x51, "f18fde23c98915fc8cc4fa566affa24ea0973601e1d02f0245a107ec019036561c89bae54b0237a78ed8ab52bc185da5421d37104477dfa1b8768238cc72b2b66538ac2c8b04c681ea4b9c86b0813980ff"}, &(0x7f0000000880)=0x59) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000008c0)={r2, 0x5}, 0x8) r3 = msgget(0x1, 0x104) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000180)=""/230) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) ppoll(&(0x7f0000000040)=[{r4, 0x800000}, {r4, 0x4}, {r0, 0xffd}], 0x3, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)={0xfffffffc}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000002c0)={{0x4, 0x3, 0x5, 0x2, '\x00', 0x8}, 0x1, [0x1000000, 0x400, 0x400, 0xffffffff80000001, 0x3, 0x7, 0x6, 0x2e0, 0x73d3, 0x7fffffff, 0x7, 0x2, 0x81, 0x6, 0x2, 0xfd8d, 0x4, 0x9, 0x3, 0x8001, 0x5, 0xff, 0x8, 0x100000001, 0xfffffffffffffffc, 0x8, 0x1, 0x0, 0x6, 0x100000001, 0x7fff, 0x6f, 0x9, 0x0, 0x5, 0x6, 0x0, 0x7, 0x5, 0x4, 0x81, 0x6f8, 0x0, 0x1, 0x5, 0x4d, 0x10000, 0x4, 0x40, 0x342, 0x6, 0x535, 0x46, 0x4, 0xffffffffffffffc0, 0x8, 0xffffffffffffff7f, 0x8, 0x6, 0xfffffffffffffff9, 0x9, 0x3347, 0x3, 0x6, 0x9, 0x7, 0x1, 0x80, 0x6b0, 0x6, 0x6, 0x80, 0x7, 0x4000000000000000, 0x0, 0x800, 0x10000, 0xff, 0x401, 0x0, 0x5, 0x6, 0x0, 0x4, 0x5, 0xd34, 0x3, 0x3, 0x4, 0x7fffffff, 0x2, 0x800, 0x1, 0x80, 0x1, 0x9, 0x6, 0xffff, 0x2, 0x5, 0x0, 0x1f, 0x7, 0x3, 0x7fffffff, 0x8, 0x100000001, 0x9860, 0x9, 0x1b8, 0x1, 0x9, 0x0, 0x1, 0xf2e1, 0x2, 0x10000, 0x10000, 0x0, 0x4, 0x5, 0x5, 0x1000, 0x401, 0x8, 0xa43b, 0x3, 0xbe48], {0x77359400}}) 21:58:27 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x0) close(0xffffffffffffffff) 21:58:27 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:27 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:27 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000000)) mknod(&(0x7f0000000080)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000340)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000380)={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, {0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x40, {0x2, 0x4e21}, 'bridge0\x00'}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r2 = accept(r1, &(0x7f00000001c0)=@hci, &(0x7f0000000280)=0x80) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'user.', 'btrfs\x00'}, &(0x7f0000000100)='&\x00', 0x2, 0x2) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/117, 0x75) fsync(r0) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 21:58:27 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673c0", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x80840) accept$packet(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) write$cgroup_int(r2, &(0x7f0000000100)=0x4c9, 0x12) 21:58:27 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:27 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673ff", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:27 executing program 0: r0 = socket(0xa, 0x10000000003, 0x2) sendmsg$unix(r0, &(0x7f0000001600)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000001540), 0x0, &(0x7f00000015c0)}, 0x0) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x8, 0x4) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x541b, &(0x7f00000001c0)) 21:58:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x110) 21:58:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000001640)={0x1d, r2}, 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) sysfs$1(0x1, &(0x7f0000000000)='vcan0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 21:58:28 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:28 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 242.050978] jfs: Unrecognized mount option "u" or missing value [ 242.128732] jfs: Unrecognized mount option "u" or missing value 21:58:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x6, 0xfa00, {0x1000000000007, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000004c0)=[{}, {}], r1, 0x1, 0x1, 0x400000}}, 0x20) 21:58:28 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_vs_stats_percpu\x00') prctl$intptr(0x0, 0x7d6) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = open(&(0x7f0000000080)="2e2f66696c65302f662e6c6530f0", 0x40003ffd, 0x0) ftruncate(r2, 0x100) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)) open(&(0x7f0000000280)="2e2f66696c65302f662e6c6530f000", 0x8042, 0x0) 21:58:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:28 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:28 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x3, &(0x7f0000000180)=0x0) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0xffffffffffffffda, 0x4, {0x1000, 0x0, 0x1c11}}, 0x20) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}]) 21:58:28 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673ff", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:28 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) socketpair$inet6(0xa, 0x0, 0x80000000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000100)="6aebb559cdab7e", 0x7) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {0x2}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @broadcast=0xffffffff}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeffffffffffffff000000000000000000000000"], 0x78) [ 242.394795] device lo entered promiscuous mode 21:58:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e1519fa00e8992aeed7d8eb67a4817b7e29635916873cdc74bbe32f31bb671e0e"], 0x114) 21:58:29 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:29 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xd60c0000, @broadcast=0xffffffff}, @udp={0x86ddffff, 0x0, 0x28}}}}}, &(0x7f0000000380)) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:58:29 executing program 1: r0 = socket$inet6(0xa, 0x80005, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) dup2(r1, r0) 21:58:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x10012, r0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x9) pipe2(&(0x7f0000000000), 0x4000) ioctl$SG_GET_NUM_WAITING(r0, 0x40087602, &(0x7f0000000080)) 21:58:29 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 243.085470] jfs: Unrecognized mount option "u" or missing value 21:58:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000000280)) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0]) getgroups(0x4, &(0x7f0000000380)=[r3, r4, r5, r6]) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000008c0)={r2, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 21:58:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x483, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") prctl$intptr(0x59616d61, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000001380)=""/4096) 21:58:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="0047fc2f07d82c99240970") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_stats={0x3c}}) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x3c0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0x4, 0x4, "3017111ead1eaf5b1b544db30939707f4dab771408ca476e1dd6f8e22998069007850cac2a9e7e4ad335e6a83875097b7738f7f35ddf97577a814a1dab78641872a97d60ffd8230d6eb0a81427e30a7962cfd5036f36f35e7260dcde7eb160ff07b5484a450e109a35c348a71c6cc242819aea5c0c9fdc7e464056afe255a29d10acf4956aab1d8acb45f4f5a769999cb2a051c709fea8d43c5f6ae3784f052d2337778d75e64435b4b34667a461ed6b7bbf4afd48bd66fd3762ef46028b74ea4085cd88d61f7e9c019b2c5ab67526cc48a90e8428ad7ce1eeaeeda45fb29730f714240001d25f971ebceaf43fa07ddcb5d3bce640b7616738c68539517a036a", 0xd8, 0x7, 0x8, 0x8, 0x4, 0x6, 0x3, 0x1}, r4}}, 0x128) close(r2) close(r1) 21:58:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:29 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:29 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 243.149942] jfs: Unrecognized mount option "u" or missing value 21:58:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\t', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:29 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) [ 243.255868] device veth0_to_bridge entered promiscuous mode 21:58:29 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 243.336260] device veth0_to_bridge left promiscuous mode 21:58:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x114) 21:58:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18c775c97f0000000000000000000000c24966050ba80acba89384"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000e4b6fffff50061180000005dc20000"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x1f, 0x101000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0x20d, &(0x7f0000000300)=""/187}, 0x48) 21:58:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:30 executing program 4: prctl$setmm(0xd, 0x0, &(0x7f0000ffc000/0x1000)=nil) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x24200, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5, 0x1294}, &(0x7f0000000080)=0x10) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x7fff, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x5, 0x20}, 0xc) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1000, 0x10000) setsockopt$inet6_dccp_int(r0, 0x21, 0xa, &(0x7f0000000200)=0x401, 0x4) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x0, 0x0) 21:58:30 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2200, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xffffffffffffff4d) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0xd40, 0x1}, &(0x7f0000000100)=0xc) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000dac000), &(0x7f0000048000)=0x1, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) io_setup(0x6, &(0x7f0000000180)=0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x8, r0, &(0x7f00000001c0)="d7c80994a0ea9e7c93067cecdec28e9ec2196a20e116d425b414e7371b0d4d8267b36472af4d2702ef567ea06575a3abd57d7de0ce63e20245ebb170f697dfdd7c02ca36c550b6b61a11efa69e094bc8510c3240653422fc1e5cbe1792337e0bd958e9efa715a7a9caaa06ba6f", 0x6d, 0x7fff, 0x0, 0x1, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000280)="fe4689dd9ee77b3ae6950312ddff5da3993434826221d0b0bd744afc7f7a249ded353299013b48f9e3e914c0252faf607fa163081eaa1ca868ef2bdf41a2465d8e580b647947dc2a6c6beaa231bc6879e8fec836c451d7269caf34d5f384ba7473acd610eacd019e14ceeecd395d60a38904051a97d8d08cf64ed47696872cb17e8aaf242a3c83158bcfa69e0d04d6defceef3e25a6a8f238ea67761", 0x9c, 0xffffffff, 0x0, 0x1, r0}]) socket$bt_hidp(0x1f, 0x3, 0x6) nanosleep(&(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) 21:58:30 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:30 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:30 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:30 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) setsockopt(r0, 0x2000000000000, 0xfff, &(0x7f0000000040)="210465769e84b2740977e039ba747f06319ef2f0522f5f5c98cabb41039fc9a1461cd1a64d4bd9356bd479cc521a5e7065d996f73dc7d302914a5a912c6b83ea43ee48cce41220d718a8b557bc2ae9b465cc9273b8b6068f9c9f04df46357570483d", 0x62) r2 = socket(0x11, 0x2, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r2, 0x106, 0x8001, &(0x7f00000001c0), 0xc4) bind$packet(r0, &(0x7f0000000240)={0x11, 0x20000000003, r1, 0x1, 0x0, 0x6}, 0x14) syz_emit_ethernet(0xe, &(0x7f0000000280)={@link_local={0x1, 0x80, 0xc2}}, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) 21:58:30 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x100, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl(r0, 0x3, &(0x7f0000000180)="b46668efce6a711cac3a4d1f709ccc64dc6cafe0432b7ffc42b50bebfa9cea8c6afa6d6dce9bbeb7f29735f2a5e83e0200000017ad7973a28063ac6635a79108dac52fba0abdecd906c8dd0dd7bc4ea8fec646fcb9446af94e669324ff07e93c453c3988412d2f8c") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0a5619000000000000000000028000007a0a00ffff0900fd63010c"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x4bb, &(0x7f0000000300)=""/187, 0x0, 0x0, [], 0x0, 0xb}, 0x48) sched_yield() [ 244.129558] jfs: Unrecognized mount option "u" or missing value [ 244.205484] jfs: Unrecognized mount option "u" or missing value 21:58:30 executing program 1: r0 = socket$kcm(0xa, 0x200000002000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x10, &(0x7f00000000c0), 0x69b) socket$inet6(0xa, 0x3, 0xffffffff7fffffff) 21:58:30 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000250007031dfffd946fa2830020200a0009000000069effffffffffffff00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x4) 21:58:30 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 244.371197] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 244.404488] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 21:58:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x114) 21:58:31 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673f6", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00fa04be8d29068047d106d08aef04872002e2b68c0a"], 0x16) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x541b, 0x707000) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x10000) faccessat(r2, &(0x7f0000000080)='./file0\x00', 0x20, 0x100) 21:58:31 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x210) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000000000010000010000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000004000000a2545319b8bbbf192681bc3f00000000000000000000000000694873e4800514930000000e00000000000000000000000000000000000000000000000000ef5dd50c3e7ced8c92"], 0x90) 21:58:31 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) listen(r1, 0x6c03) sendto$inet6(r1, &(0x7f0000000100)="f169dab3588303a5336565539cbfecb8840f13881692635cc21e27e92cf90039a1e6c088a0901d59e1494ef15ed661645a4bf209d82133c215c2ccc3abdbb2043607ff98c4205d52696b734e08ca47d31da424ba967d2cd9e4f8fcad48d475275067ffb326c36132997aab04b4c61c3d592da89d47db5e00858f6e27690323177213984509d98abf8316b0732422423aba3b7daba4f5e84d5aa8", 0x9a, 0x20040040, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x9) fallocate(r0, 0x30, 0x7fff, 0x410) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000040)='bcsh0\x00', 0x6}) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000530407031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 21:58:31 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000), 0x0) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:31 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 245.251138] audit: type=1107 audit(1531432711.499:5): pid=13128 uid=0 auid=4294967295 ses=4294967295 msg=' [ 245.251138] ' [ 245.282126] audit: type=1107 audit(1531432711.512:6): pid=13128 uid=0 auid=4294967295 ses=4294967295 msg=' [ 245.282126] ' 21:58:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292", 0xc) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:31 executing program 1: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r2, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000604ffc)) dup2(r1, r3) 21:58:31 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) listen(r1, 0x6c03) sendto$inet6(r1, &(0x7f0000000100)="f169dab3588303a5336565539cbfecb8840f13881692635cc21e27e92cf90039a1e6c088a0901d59e1494ef15ed661645a4bf209d82133c215c2ccc3abdbb2043607ff98c4205d52696b734e08ca47d31da424ba967d2cd9e4f8fcad48d475275067ffb326c36132997aab04b4c61c3d592da89d47db5e00858f6e27690323177213984509d98abf8316b0732422423aba3b7daba4f5e84d5aa8", 0x9a, 0x20040040, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x9) fallocate(r0, 0x30, 0x7fff, 0x410) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000040)='bcsh0\x00', 0x6}) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000530407031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 21:58:31 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) [ 245.319627] jfs: Unrecognized mount option "u" or missing value [ 245.426352] audit: type=1107 audit(1531432711.674:7): pid=13155 uid=0 auid=4294967295 ses=4294967295 msg=' [ 245.426352] ' [ 245.430868] jfs: Unrecognized mount option "u" or missing value 21:58:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x116) 21:58:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setpgid(0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9eb, 0x101800) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x0, &(0x7f0000000340), &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000540)) ioctl(r3, 0x800008912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 21:58:32 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:32 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x88, r2, 0x4, 0x70bd25, 0x25dfdbfc, {0xf}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast=0xffffffff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x15, 0x13}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000003c0)={0x0, 0x8001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000440)={r4, 0x8001, 0x20, 0x1000, 0x4}, &(0x7f0000000480)=0x18) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$int_out(r5, 0x80184132, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xffffff9e, 0x2}, [@NDA_LLADDR={0xc, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) 21:58:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef91", 0x12) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:32 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) [ 246.115353] jfs: Unrecognized mount option "u" or missing value 21:58:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c", 0x15) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:32 executing program 4: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4040, &(0x7f0000000180)) r0 = creat(&(0x7f0000002500)='./file0/bus\x00', 0xcebb6074bb566d03) write$P9_RREADDIR(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x0, 0x2}) 21:58:32 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 246.181094] jfs: Unrecognized mount option "u" or missing value 21:58:32 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x43, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x3000000) 21:58:32 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c2", 0x17) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 246.384482] jfs: Unrecognized mount option "u" or missing value [ 246.450339] jfs: Unrecognized mount option "u" or missing value 21:58:33 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x6945f208}, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000)=0x7, 0x4) 21:58:33 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1000002, 0x100000002132, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x8000000000000000, 0x1013, r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x82043, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000001c0)) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r2, 0x800, 0x4, &(0x7f0000000200)="bfd14382d321ba5834a367e18f6f5ae6178ee7f9ebb2aae49562a5c10b1523ea85e344216b9367a7adcfc450d7d24a54344fa56268986b94995c94bff2f5d8c59911e06445b5e3f8fa5a233d55842f6c7f6c606ddcf1", 0x56) getsockopt$inet6_int(r1, 0x29, 0xd0, &(0x7f0000000340), &(0x7f0000000040)=0xfffffffffffffef4) 21:58:33 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e1519fa00e8992aeed7d8eb67a4817b7e29635916873cdc74bbe32f31bb671e0eb838"], 0x116) 21:58:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfsp', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:33 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:33 executing program 0: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast2, @in=@loopback}}, {{@in=@loopback}}}, &(0x7f00000000c0)=0xe8) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x407ff, 0x0) r3 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) socket$inet6(0xa, 0x2, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000), 0x4) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) sendfile(r2, r1, &(0x7f0000000300), 0x102000001) 21:58:33 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xdaffffff00000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000002940), &(0x7f0000002740)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}, [0xc3e, 0x7ff, 0x5, 0x2ff6, 0x3, 0x2, 0x7, 0x3, 0x80000000, 0x6, 0x2, 0x3246, 0x3, 0x6de, 0x5]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0x2b1, @remote={0xfe, 0x80, [], 0xbb}, 0x6}}, 0x15a4, 0x3, 0x1, 0x4, 0x40}, &(0x7f0000000200)=0x98) 21:58:33 executing program 6 (fault-call:4 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:33 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/wireless\x00') perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x5, 0x8000, 0x6, 0x10000, 0x0, 0x0, 0x4, 0x0, 0x3, 0xf8d0, 0x3ff, 0x20, 0x80000001, 0xfffffffffffffffd, 0x3, 0x1287c00000000000, 0x400, 0x8ebd, 0x2, 0x0, 0x7, 0xfffffffffffffc00, 0x85e8, 0x3, 0x7, 0x6, 0x0, 0xb2, 0x80000001, 0x6, 0x1, 0xfff, 0x340, 0x8, 0x7, 0x4f, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000180), 0x8}, 0x200, 0x40, 0x3, 0x7, 0x80000, 0x80000000}, r0, 0x1, r1, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = getpgid(0xffffffffffffffff) getpriority(0x1, r2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x8000, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570927749bd", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r3, &(0x7f0000001000), 0x1000) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x8}}, 0x50) 21:58:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 247.376795] FAULT_INJECTION: forcing a failure. [ 247.376795] name failslab, interval 1, probability 0, space 0, times 0 [ 247.388235] CPU: 1 PID: 13283 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 247.395610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.404970] Call Trace: [ 247.407572] dump_stack+0x1c9/0x2b4 [ 247.411220] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.416425] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 247.421278] ? csum_and_copy_from_iter+0x14e0/0x14e0 21:58:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f0000000080)) close(r2) 21:58:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 247.426393] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 247.430994] should_fail.cold.4+0xa/0x1a [ 247.435077] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.440193] ? print_usage_bug+0xc0/0xc0 [ 247.444264] ? __wake_up_common_lock+0x1d0/0x330 [ 247.449057] ? find_held_lock+0x36/0x1c0 [ 247.453158] ? check_same_owner+0x340/0x340 [ 247.457496] ? fuse_copy_do+0x260/0x400 [ 247.461486] ? rcu_note_context_switch+0x730/0x730 [ 247.466433] __should_failslab+0x124/0x180 [ 247.470688] should_failslab+0x9/0x14 [ 247.474505] kmem_cache_alloc_trace+0x2cb/0x780 [ 247.479208] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 247.484067] ? print_usage_bug+0xc0/0xc0 [ 247.488133] fuse_dev_do_write+0xd74/0x3700 [ 247.492460] ? print_usage_bug+0xc0/0xc0 [ 247.496530] ? fuse_dev_read+0x250/0x250 [ 247.500623] ? trace_hardirqs_on+0x10/0x10 [ 247.504861] ? trace_hardirqs_on+0x10/0x10 [ 247.509120] ? trace_hardirqs_on+0x10/0x10 [ 247.513346] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 247.518182] ? perf_trace_lock+0x920/0x920 [ 247.522415] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 247.527258] ? perf_trace_lock+0x920/0x920 [ 247.531503] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 247.536338] ? graph_lock+0x170/0x170 [ 247.540134] ? perf_trace_lock+0x920/0x920 [ 247.544362] ? find_held_lock+0x36/0x1c0 [ 247.548502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.554037] ? _parse_integer+0x13b/0x190 [ 247.558193] ? find_held_lock+0x36/0x1c0 [ 247.562257] ? lock_downgrade+0x8f0/0x8f0 [ 247.566410] ? kasan_check_read+0x11/0x20 [ 247.570544] ? rcu_is_watching+0x8c/0x150 [ 247.574692] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 247.579098] ? memset+0x31/0x40 [ 247.582383] fuse_dev_write+0x19a/0x240 [ 247.586350] ? fuse_dev_splice_write+0xe60/0xe60 [ 247.591094] ? expand_files.part.8+0x9c0/0x9c0 [ 247.595672] ? proc_fail_nth_write+0x9e/0x210 [ 247.600157] ? proc_cwd_link+0x1d0/0x1d0 [ 247.604211] ? kasan_check_read+0x11/0x20 [ 247.608352] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.613878] ? iov_iter_init+0xc9/0x1f0 [ 247.617863] __vfs_write+0x6c6/0x9f0 [ 247.621578] ? kernel_read+0x120/0x120 [ 247.625466] ? wait_for_completion+0x8d0/0x8d0 [ 247.630066] ? rw_verify_area+0x118/0x360 [ 247.634206] vfs_write+0x1f8/0x560 [ 247.637741] ksys_write+0x101/0x260 [ 247.641360] ? __ia32_sys_read+0xb0/0xb0 [ 247.645413] ? syscall_slow_exit_work+0x500/0x500 [ 247.650250] __x64_sys_write+0x73/0xb0 [ 247.654130] do_syscall_64+0x1b9/0x820 [ 247.658013] ? finish_task_switch+0x1d3/0x870 [ 247.662506] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.667428] ? syscall_return_slowpath+0x31d/0x5e0 [ 247.672440] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 247.677797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.682639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.687841] RIP: 0033:0x455a79 [ 247.691019] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.710395] RSP: 002b:00007fe0351c0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 247.718182] RAX: ffffffffffffffda RBX: 00007fe0351c16d4 RCX: 0000000000455a79 21:58:34 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xfffffff2, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 247.725533] RDX: 0000000000000021 RSI: 00000000200000c0 RDI: 0000000000000014 [ 247.732794] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 247.740049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 247.747441] R13: 00000000004c280d R14: 00000000004d4598 R15: 0000000000000000 [ 247.767944] jfs: Unrecognized mount option "u" or missing value 21:58:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e63707500eac5bea7af575a45fddd5af3a7709295a69e7bc5fd0592bf2a4dc8ace908be8842141ca2a714ed0163d4afd8ac48123d4869e05556a93347d6a7430e03a5f2beb186f16bacf2e4dcdcf3b9ff1d99165ce38d996e7798fe471d9a0d81acd08788fcc9892a2487efcde7a649614b14ba1c18", 0x200002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x300c0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x17, 0x2, 0x4d}) r2 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.memory_migrate\x00', 0x2, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000000c0)={[0x7000, 0x0, 0x3000], 0x1, 0x5d, 0x8}) sendfile(r0, r2, &(0x7f0000000080), 0x1000000000400) [ 247.813988] jfs: Unrecognized mount option "u" or missing value 21:58:34 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x1a0ffffffff, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:34 executing program 6 (fault-call:4 fault-nth:1): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x80000001, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="800000000400000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x50200) ioctl$TIOCSBRK(r0, 0x5427) 21:58:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x116) 21:58:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x1000004, 0x10000032, 0xffffffffffffffff, 0x0) futex(&(0x7f0000001000), 0x8c, 0x1, &(0x7f0000191000), &(0x7f0000000000), 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfff0000000000000, 0x20000) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000540)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000000c0)={0x0, 0x5}) r2 = gettid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) lremovexattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=@known='security.capability\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000200)="81abd851fd95d6a46eb841c268bdeffbb30073a3f6c1b22b328c9cc1810d4247976c740ff28f94587c954b211583147cfb14b22d6a6f1012430b771c21905ce94d83bcd5fb3fd9a3bd7ab67189b03fd70be05f053a479ded4b8c4376cbf500ca8bf2d9", 0x63}], 0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="4b8c0cc041361ad6d080000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x4}, 0x44000) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) 21:58:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = shmget(0x3, 0x2000, 0x8000000000100, &(0x7f0000ffb000/0x2000)=nil) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000240)=""/134) rt_sigtimedwait(&(0x7f0000000000)={0xfffffffffffff6b1}, &(0x7f0000000040), &(0x7f0000000080)={0x77359400}, 0x8) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000003c0)=0x800) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000440), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180)="01", &(0x7f0000000240)}, 0x20) socketpair(0x1d, 0x4, 0x8, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet6_buf(r3, 0x29, 0x23, &(0x7f0000000300)=""/26, &(0x7f0000000340)=0x1a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 21:58:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 248.174459] jfs: Unrecognized mount option "u" or missing value [ 248.190149] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 248.199334] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 248.208434] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 21:58:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:34 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xffffffff00000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@dev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) sendmsg$xdp(r1, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x1, r2, 0x23}, 0x10, &(0x7f0000000700)=[{&(0x7f00000002c0)="73e44f572750c07f1b8ebcf39e441135e1128071d8fe70ee0b04eeb92121e8572ad4adb5db8b0b4e7c575ffeb8e7279a10d0d6375495f8f866eb835a547230e1b6dc8cb1afb41b4ad40016ccce00e94958ec18b210ea471f632909983d8be596ad165f6c428cdbaf", 0x68}, {&(0x7f0000000400)="56d6888e3da8a6d5b96af575cdbae60f635540e54c4e7c20c29564869433605f4b2c435b847f9083bece68d9afe1a564b31dbcf97494470159b8341daf7949ab43274a378a9dd611cc5c334a52339bed78f0557be8dc973355919e8045348db2b1febc78644264fb8aac8f8006a6dcb004e3c60d64f6c55eeca9c9d4484d1ea50e903d15a8f1385d6bf9f3aa11b4c2d5a851e8aa41e4f12b654e18dcf86345feda9ff5074bc34b585fdf3e3bcecef96d791d2a9065124b14ca4d2ce5e5b0528db0c70a1fb7", 0xc5}, {&(0x7f0000000500)="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", 0xfb}, {&(0x7f0000000340)="535ba45d39bc20fc1d9351aab80ba072ceb1f8b12bab55b8b86b368966b5454d7a20ef8d7d81dfc2138829b2e684e831af75a98a899827944553be83c3b30d0b6e500cdc0dd08e3f2086a8f869cee7568ff592e71f6d", 0x56}, {&(0x7f0000000600)="1ab971e6a85e9d025de5ab6b2ab691d8b9d1ba09cb56af45946a78fc58c628103f83d9b073e3bc3e1809e74e4148aefc0c637a539af728f4a89e2eddb0a302049aad4823c68f56819bc53b9bc3b8bf194153fdf05d87903e448331b877e8d2584e5368c5f0d7bc6c93c9bbce778234ef2434c03f63a1ac279ed92f86af04b08776011d281335bdf8ece65b661839595c38b52dda0f579c1eb70e1b0fe6347dd7aabfa1fb1e4647fa458443a6a807a3b62b70a0637731bbab4d19ba91070391694a3c39603bf5214864060f64aa1f55666c7a40dfda4e5f86316c4b55db965dd72658870351dc8b33f4fa", 0xea}], 0x5, 0x0, 0x0, 0x20040000}, 0x20000895) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x2, 0xffffffffffffffff}, 0x3) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000003c0)=0x5a) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vsock\x00', 0x105000, 0x0) statx(r3, &(0x7f00000007c0)='./file0\x00', 0x0, 0x800, &(0x7f0000000800)) getsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000900)={@loopback, @loopback}, &(0x7f0000000940)=0xc) [ 248.217499] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 248.226834] EXT4-fs (loop0): group descriptors corrupted! [ 248.248604] jfs: Unrecognized mount option "u" or missing value [ 248.310106] protocol 4a75 is buggy, dev gre0 21:58:34 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x2) write$P9_RVERSION(r2, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x5, 0x6, '9P2000'}, 0x13) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x2, 0x0, [0x0, 0x0]}) 21:58:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:34 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x100000000000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:34 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) [ 248.431723] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 248.441055] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 248.450204] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 248.459467] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 248.469072] EXT4-fs (loop0): group descriptors corrupted! [ 248.483513] jfs: Unrecognized mount option "u" or missing value 21:58:34 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xc0ffffff, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 248.534823] jfs: Unrecognized mount option "u" or missing value 21:58:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfst', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:34 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x40000) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x8000800000000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2}, 0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 21:58:34 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x200000e1, 0x3}, 0x21) 21:58:35 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xffffffffa0010000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:35 executing program 1: setrlimit(0x8, &(0x7f00000a3ff0)) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000000)=0x2b2) shmget(0x1, 0x2000, 0x45, &(0x7f0000ffc000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x80, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) 21:58:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a66737f", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:35 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0xf, 0x3}, 0x21) 21:58:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x117) 21:58:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000016000)=[{0x28, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f00000000c0)={0x2b, 0x4, 0x0, {0x0, 0x400, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) 21:58:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000480)={0x10, 0xbb7f}, 0x3addb8b3ff2cbe7c, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18020000220001010000000000000000040000f79643bb4a"], 0x1}, 0x1}, 0x4) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'trusted]\'\x00'}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/6, &(0x7f0000000100)=0x6) r1 = semget$private(0x0, 0x0, 0x20) semctl$GETNCNT(r1, 0x0, 0xe, &(0x7f0000000080)=""/60) 21:58:35 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="dd9b158a496164cc27e45b38aef867dc51b07d0fea8d47e0000041ac1414aa0b000000"], 0x18) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'ip6gretap0\x00', 0x95}) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0xe0000000, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 21:58:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)="000100020400000066000000c9030000ec000204cb57136dc38e93c000000000002000000020000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646174615f6572723d69676e6fd7f4fbb8ea1b44605d9e53c71f92bdd972652c00"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x408880, 0x60) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x9, 0xfe, "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"}) 21:58:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:35 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x1000000000, 0x2, 0x0, 0x0, 0x3, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x3, 0x200000) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000180)) r2 = userfaultfd(0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)={0x2000}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000cd8ff4)) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000007000)={0xffffffffc0000001}) epoll_wait(r5, &(0x7f00000000c0)=[{}], 0x15f60b4, 0x0) epoll_wait(r6, &(0x7f0000000000)=[{}], 0x136e, 0x0) epoll_wait(r6, &(0x7f0000cd8ff4)=[{}], 0x1, 0x0) ioctl$UFFDIO_UNREGISTER(r2, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 21:58:35 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xffffffda, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:35 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x4}, 0x21) 21:58:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 249.367611] EXT4-fs (loop4): Unrecognized mount option "data_err=igno×ôû¸êD`]žSÇ’½Ùre" or missing value 21:58:35 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xa00000000000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:35 executing program 3 (fault-call:7 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 249.422762] EXT4-fs (loop4): Unrecognized mount option "data_err=igno×ôû¸êD`]žSÇ’½Ùre" or missing value [ 249.446620] jfs: Unrecognized mount option "u" or missing value 21:58:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x139) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1=0xe0000001}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000280)}, 0x8000) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000180)=0x4) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffd, 0x2000) ioctl$TIOCNXCL(r1, 0x540d) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100)=0x1459, 0xfe3a) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x34) [ 249.502439] jfs: Unrecognized mount option "u" or missing value 21:58:35 executing program 0: prctl$intptr(0x1c, 0x7) setuid(0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = dup3(r1, r2, 0x80000) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x800) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0063404000000000000000000000000000000000000000000000000000180000000000000010000000000000003383aa3bbe33ee10f7cd4522ac6166d47e4d1cd5e458e6ae1c8890ad523a1f49c274fac935a3c7b49daee3a6b5cb5adb2e7f74c90f950d3e591f15a4b867b6996f956df8a013e70700000000000000000000000000000000a15c04b09aa88e51bad9a26342dec33981df407994042d75394ff60fa35d5fc787641cd5b50cb0ba0299c34eedface9fdac0587fac3a9cc5a5cc0953c087417013740cbd7e497a73233448dbe30a70b948f1ac966349aedd7476c7aecb662f7f58b9313c2d2460e2e699175267bf04a7829dda1313a7e74638fd9fe3d9741643ddc2c359eac8ca20fc6e106713e96825295d85148482c696da3f03e9747999c9bcd7c54a07da043bc4cba476f9ee", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a627300000000", @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f00000003c0)}) [ 249.600948] FAULT_INJECTION: forcing a failure. [ 249.600948] name failslab, interval 1, probability 0, space 0, times 0 [ 249.612724] CPU: 1 PID: 13491 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #143 [ 249.620102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.629463] Call Trace: [ 249.632071] dump_stack+0x1c9/0x2b4 [ 249.635720] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.640941] ? print_usage_bug+0xc0/0xc0 [ 249.645032] should_fail.cold.4+0xa/0x1a 21:58:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp\x00') accept$nfc_llcp(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x60) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0), 0x117) 21:58:35 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x5}, 0x21) [ 249.649119] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.650511] binder: 13494:13495 got transaction to context manager from process owning it [ 249.654308] ? graph_lock+0x170/0x170 [ 249.654344] ? print_usage_bug+0xc0/0xc0 [ 249.654366] ? find_held_lock+0x36/0x1c0 [ 249.662741] binder: 13494:13495 transaction failed 29201/-22, size 4096--1282472305397386496 line 2843 [ 249.666587] ? __lock_is_held+0xb5/0x140 [ 249.666620] ? check_same_owner+0x340/0x340 [ 249.684691] binder: BINDER_SET_CONTEXT_MGR already set [ 249.688203] ? rcu_note_context_switch+0x730/0x730 [ 249.688221] ? trace_hardirqs_on+0xd/0x10 [ 249.688241] __should_failslab+0x124/0x180 [ 249.688264] should_failslab+0x9/0x14 [ 249.703052] binder_alloc: 13494: binder_alloc_buf, no vma [ 249.706892] __kmalloc+0x2c8/0x760 [ 249.706909] ? __local_bh_enable_ip+0x161/0x230 [ 249.706924] ? sock_kmalloc+0x156/0x1f0 [ 249.706941] sock_kmalloc+0x156/0x1f0 [ 249.706957] ? __sk_mem_schedule+0xe0/0xe0 [ 249.711256] binder: 13494:13496 transaction failed 29189/-3, size 4096--1282472305397386496 line 2967 [ 249.714995] ? __init_waitqueue_head+0x150/0x150 [ 249.715011] ? mark_held_locks+0xc9/0x160 [ 249.715032] af_alg_alloc_areq+0x83/0x280 [ 249.715049] ? alg_accept+0x60/0x60 [ 249.741549] binder: 13494:13495 ioctl 40046207 0 returned -16 [ 249.750094] ? __local_bh_enable_ip+0x161/0x230 [ 249.750119] skcipher_recvmsg+0x354/0x1220 [ 249.750145] ? skcipher_bind+0x30/0x30 [ 249.750165] skcipher_recvmsg_nokey+0x69/0x90 [ 249.750183] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 249.794795] sock_recvmsg+0xd0/0x110 [ 249.798531] __sys_recvfrom+0x311/0x5d0 [ 249.799841] binder: undelivered TRANSACTION_ERROR: 29201 [ 249.802517] ? __ia32_sys_send+0x100/0x100 [ 249.802538] ? wait_for_completion+0x8d0/0x8d0 [ 249.802559] ? __lock_is_held+0xb5/0x140 [ 249.802588] ? __sb_end_write+0xac/0xe0 [ 249.818921] binder: undelivered TRANSACTION_ERROR: 29189 [ 249.821007] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 249.821023] ? fput+0x130/0x1a0 [ 249.821040] ? ksys_write+0x1ae/0x260 [ 249.821057] ? __ia32_sys_read+0xb0/0xb0 [ 249.821083] __x64_sys_recvfrom+0xe1/0x1a0 [ 249.851590] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 249.856598] do_syscall_64+0x1b9/0x820 [ 249.860475] ? finish_task_switch+0x1d3/0x870 [ 249.864963] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.869885] ? syscall_return_slowpath+0x31d/0x5e0 [ 249.874812] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 249.880180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.885027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.890203] RIP: 0033:0x455a79 [ 249.893375] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.912702] RSP: 002b:00007f7faafa2c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 249.920497] RAX: ffffffffffffffda RBX: 00007f7faafa36d4 RCX: 0000000000455a79 [ 249.927753] RDX: 0000000000000065 RSI: 0000000020000240 RDI: 0000000000000015 [ 249.935021] RBP: 000000000072bea0 R08: 0000000020000000 R09: 000000000070115a [ 249.942289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 249.949545] R13: 00000000004c0a41 R14: 00000000004d0dd0 R15: 0000000000000000 21:58:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) pread64(r0, &(0x7f0000000180)=""/28, 0x1c, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20000000000a, &(0x7f00000001c0)=0xcba8, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffea0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x29a, 0x4) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x9de3d32422b789cd) write$FUSE_POLL(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x400}}, 0x18) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) syz_open_procfs(r2, &(0x7f0000000140)='auxv\x00') ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000003c0)=r1) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x400000, 0x0) fgetxattr(r0, &(0x7f0000000480)=@known='security.evm\x00', &(0x7f00000004c0)=""/140, 0x8c) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0x77, 0x4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000000400)={'ah\x00'}, &(0x7f0000000440)=0x1e) getsockopt$inet6_int(r3, 0x29, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) readv(r0, &(0x7f0000001980)=[{&(0x7f0000000300)=""/177, 0x93}], 0x100000000000011c) 21:58:36 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xc0ffffff00000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000080)={0x2, 0x860, 0xffffffff92d234d7}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) 21:58:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000000)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca0000cf", 0x1f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 21:58:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e1519fa00e8992aeed7d8eb67a4817b7e29635916873cdc74bbe32f31bb671e0eb8386c"], 0x117) 21:58:36 executing program 3 (fault-call:7 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:36 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x6}, 0x21) [ 250.213477] FAULT_INJECTION: forcing a failure. [ 250.213477] name failslab, interval 1, probability 0, space 0, times 0 [ 250.224998] CPU: 0 PID: 13521 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #143 [ 250.232477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.241936] Call Trace: [ 250.244549] dump_stack+0x1c9/0x2b4 [ 250.248205] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.253421] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 250.258292] ? csum_and_copy_from_iter+0x14e0/0x14e0 [ 250.263427] should_fail.cold.4+0xa/0x1a [ 250.267517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.272643] ? find_held_lock+0x36/0x1c0 [ 250.276864] ? graph_lock+0x170/0x170 [ 250.280774] ? graph_lock+0x170/0x170 [ 250.284818] ? find_held_lock+0x36/0x1c0 [ 250.288911] ? __lock_is_held+0xb5/0x140 [ 250.292409] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 250.293002] ? check_same_owner+0x340/0x340 [ 250.293025] ? rcu_read_lock_sched_held+0x108/0x120 [ 250.293044] ? rcu_note_context_switch+0x730/0x730 [ 250.293066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.293084] __should_failslab+0x124/0x180 [ 250.327428] should_failslab+0x9/0x14 [ 250.331361] __kmalloc+0x2c8/0x760 [ 250.334921] ? af_alg_make_sg+0x4f0/0x4f0 [ 250.339086] ? sock_kmalloc+0x156/0x1f0 [ 250.339574] jfs: Unrecognized mount option "u" or missing value [ 250.343067] ? mark_held_locks+0xc9/0x160 [ 250.343087] sock_kmalloc+0x156/0x1f0 [ 250.343104] ? __sk_mem_schedule+0xe0/0xe0 [ 250.343120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.343140] ? af_alg_count_tsgl+0x1bc/0x250 [ 250.371666] skcipher_recvmsg+0x4ee/0x1220 [ 250.382102] ? skcipher_bind+0x30/0x30 [ 250.386039] skcipher_recvmsg_nokey+0x69/0x90 [ 250.390547] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 250.395317] sock_recvmsg+0xd0/0x110 [ 250.401888] __sys_recvfrom+0x311/0x5d0 [ 250.405884] ? __ia32_sys_send+0x100/0x100 21:58:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) bind(r1, &(0x7f0000000200)=@sco={0x1f, {0x3, 0x1ff, 0x80000000, 0x3, 0x4, 0x1f}}, 0x80) r2 = dup2(r1, r0) ioctl$sock_bt(r2, 0x541b, &(0x7f0000000100)="b4d2c6f48ec19d4a3c84ae99b6bf2457f811db7d6bbb341e2cf6aab76ac992ace0dcd9a2f91b3d452dee5ca23efcabc642415a057435f45a3802a5509865c8dd46e48e35591c4550a891d565af3386bdc66cb9b388d9b7a2e1b5d04d6b18de9e4fd48dda6090f44399fd997c9471bb3d1d4992827e01ff560b143f0f935a23e2472face83f5c8ed42a5653663f26dcd29dc99eb29c147a5c1ab9879702e22f900b3c7399ee6d0bc01278fea36e90b03864870307b63a498575e69bfc8f398d7ddafcd8c9b4f4b5b794") connect$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xc0000000000, 0x81, 0x7, 0x6, 0xc1, 0xff}}, 0xa) getpeername(r1, &(0x7f0000000080)=@l2, &(0x7f0000000000)=0x80) 21:58:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000440)="025cc83d6d345f8f762070") r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) close(r2) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 21:58:36 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xa0010000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:36 executing program 1: r0 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)="1247d97cdd34d9c1e4e3244d85e09b39ee801bcad77f4cbd2d41b473f671be806e6a6abeae6d99985408e90086d2db63f9531a12a229d6dd3862e261066d5984d62c388db4c78fb700b5863d913e8c2c21839307986e9cc04604076ff6d3b6e65383b43e1e2b26ab3c720027cf3c1ef6f9c903d2a06fc1daf5369cfdee10ccfc770602c522f6d1916b46209b6a59e283bd10aca1dafe4244ed7966bdf23db28455040370c747abe3109fe5029d00f8ef600769b626aa32ffc47215760c80a04c651aba890873be2aa538cd27", 0xcc, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f0000000180)=""/89, 0x59) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x5, 0x8, 0x0, 0x7, 0xfffffffffffffffa}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000380)={r2, 0x2c, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, @in={0x2, 0x4e23, @multicast1=0xe0000001}]}, &(0x7f00000003c0)=0x10) readlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/138, 0x8a) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000500)=0x6, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000540)=[@in={0x2, 0x4e23, @multicast2=0xe0000002}, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x12}, 0x4}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e22, @rand_addr=0x4}, @in6={0xa, 0x4e23, 0x20, @local={0xfe, 0x80, [], 0xaa}, 0x7fffffff}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in={0x2, 0x4e22, @multicast2=0xe0000002}], 0x88) r3 = fcntl$dupfd(r1, 0x0, r1) write$FUSE_INTERRUPT(r3, &(0x7f0000000600)={0x10, 0x0, 0x7}, 0x10) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000640)={0x0, 0x0, {0x33, 0x31, 0x16, 0x1f, 0x3, 0x100, 0x6, 0xeb, 0x1}}) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000680)=@assoc_value={r2, 0x400}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000700)={r2, 0x38, &(0x7f00000006c0)=[@in6={0xa, 0x4e23, 0x40, @dev={0xfe, 0x80, [], 0xe}, 0x101}, @in6={0xa, 0x4e20, 0x7, @empty, 0x401}]}, &(0x7f0000000740)=0x10) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) utimensat(r3, &(0x7f0000000780)='./file0\x00', &(0x7f0000000800)={{}, {r5, r6/1000+10000}}, 0x100) socketpair(0xf, 0x5, 0x7fffffff, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) lremovexattr(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=@known='system.sockprotoname\x00') clock_gettime(0x0, &(0x7f0000000900)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r8, 0x28, 0x6, &(0x7f0000000940)={r9, r10/1000+10000}, 0x10) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r7, 0x118, 0x1, &(0x7f0000000980)=0xfffffffffffffff7, 0x4) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000009c0)) write$P9_RLINK(r3, &(0x7f0000000a00)={0x7, 0x47, 0x2}, 0x7) r11 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000a40)=0x0) rt_tgsigqueueinfo(r11, r12, 0x28, &(0x7f0000000a80)={0x40, 0xb3, 0x5, 0x6}) utimensat(r8, &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={{0x77359400}}, 0x100) ioctl$TCGETA(r7, 0x5405, &(0x7f0000000b40)) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000b80)={r4, 0x3, 0x1, [0x5]}, 0xa) r13 = getegid() stat(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0, 0x0}, &(0x7f0000000d40)=0xc) r17 = getgid() stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000e40)=[r13, r14, r15, r16, r17, r18]) [ 250.410135] ? wait_for_completion+0x8d0/0x8d0 [ 250.414737] ? __lock_is_held+0xb5/0x140 [ 250.418830] ? __sb_end_write+0xac/0xe0 [ 250.422832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 250.428398] ? fput+0x130/0x1a0 [ 250.431705] ? ksys_write+0x1ae/0x260 [ 250.435521] ? __ia32_sys_read+0xb0/0xb0 [ 250.439610] __x64_sys_recvfrom+0xe1/0x1a0 [ 250.443865] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 250.448895] do_syscall_64+0x1b9/0x820 [ 250.452808] ? syscall_return_slowpath+0x5e0/0x5e0 [ 250.457756] ? syscall_return_slowpath+0x31d/0x5e0 [ 250.462710] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 250.468093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.472949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.478130] RIP: 0033:0x455a79 [ 250.481303] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.500565] RSP: 002b:00007f7faafa2c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 250.508275] RAX: ffffffffffffffda RBX: 00007f7faafa36d4 RCX: 0000000000455a79 [ 250.515528] RDX: 0000000000000065 RSI: 0000000020000240 RDI: 0000000000000015 [ 250.522786] RBP: 000000000072bea0 R08: 0000000020000000 R09: 000000000070115a [ 250.530054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 250.537403] R13: 00000000004c0a41 R14: 00000000004d0dd0 R15: 0000000000000001 21:58:36 executing program 3 (fault-call:7 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 250.562222] jfs: Unrecognized mount option "u" or missing value 21:58:36 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x2}, 0x21) [ 250.620929] FAULT_INJECTION: forcing a failure. [ 250.620929] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 250.632884] CPU: 1 PID: 13555 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #143 [ 250.640256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.649620] Call Trace: [ 250.652226] dump_stack+0x1c9/0x2b4 [ 250.655875] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.661077] ? vma_kernel_pagesize+0xb0/0xb0 [ 250.665497] should_fail.cold.4+0xa/0x1a [ 250.669563] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.674668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.680211] ? page_trans_huge_map_swapcount+0xab9/0xf60 [ 250.685658] ? graph_lock+0x170/0x170 [ 250.689472] ? find_held_lock+0x36/0x1c0 [ 250.693557] ? __lock_is_held+0xb5/0x140 [ 250.697620] ? check_same_owner+0x340/0x340 [ 250.701931] ? rcu_note_context_switch+0x730/0x730 [ 250.706875] __alloc_pages_nodemask+0x36e/0xdb0 [ 250.711533] ? print_usage_bug+0xc0/0xc0 [ 250.715593] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 250.720599] ? __lock_acquire+0x7fc/0x5020 [ 250.724843] ? print_usage_bug+0xc0/0xc0 [ 250.728918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.734459] ? reuse_swap_page+0x3a8/0xcb0 [ 250.738690] ? swp_swapcount+0x520/0x520 [ 250.742748] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 250.748283] alloc_pages_vma+0xdd/0x540 [ 250.752256] wp_page_copy+0x254/0x1460 [ 250.756147] ? follow_pfn+0x2b0/0x2b0 [ 250.759948] ? lock_downgrade+0x8f0/0x8f0 [ 250.764093] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 250.769629] ? kasan_check_read+0x11/0x20 [ 250.773767] ? do_raw_spin_unlock+0xa7/0x2f0 [ 250.778174] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 250.782747] ? __pte_alloc_kernel+0x2e0/0x2e0 [ 250.787245] do_wp_page+0x42d/0x19b0 [ 250.790957] ? finish_mkwrite_fault+0x610/0x610 [ 250.795619] ? trace_hardirqs_on+0x10/0x10 [ 250.799851] ? lock_acquire+0x1e4/0x540 [ 250.803822] ? lock_release+0xa30/0xa30 [ 250.807786] ? trace_hardirqs_on+0x10/0x10 [ 250.812010] ? pmd_val+0x88/0x100 [ 250.815456] ? add_mm_counter_fast+0xd0/0xd0 [ 250.819855] ? kasan_check_write+0x14/0x20 [ 250.824079] ? do_raw_spin_lock+0xc1/0x200 [ 250.828309] __handle_mm_fault+0x2a84/0x4460 [ 250.832714] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 250.837545] ? graph_lock+0x170/0x170 [ 250.841349] ? lock_downgrade+0x8f0/0x8f0 [ 250.845491] ? kasan_check_read+0x11/0x20 [ 250.849631] ? rcu_is_watching+0x8c/0x150 [ 250.853772] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 250.858175] ? handle_mm_fault+0x8c4/0xc80 [ 250.862402] handle_mm_fault+0x53e/0xc80 [ 250.866456] ? __handle_mm_fault+0x4460/0x4460 [ 250.871040] ? find_vma+0x34/0x190 [ 250.874573] __do_page_fault+0x620/0xe50 [ 250.878629] ? lock_downgrade+0x8f0/0x8f0 [ 250.882773] ? mm_fault_error+0x380/0x380 [ 250.886920] ? __local_bh_enable_ip+0x161/0x230 [ 250.891578] ? graph_lock+0x170/0x170 [ 250.895367] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 250.900372] ? release_sock+0x1ec/0x2c0 [ 250.904339] do_page_fault+0xf6/0x8c0 [ 250.908142] ? _raw_spin_unlock_bh+0x30/0x40 [ 250.912550] ? vmalloc_sync_all+0x30/0x30 [ 250.916691] ? find_held_lock+0x36/0x1c0 [ 250.920753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.925684] page_fault+0x1e/0x30 [ 250.929125] RIP: 0010:move_addr_to_user+0xba/0x200 [ 250.934036] Code: 2b 8e fb 45 85 ed 0f 88 3e 01 00 00 e8 af 2a 8e fb 31 ff 44 89 f6 e8 b5 2b 8e fb 45 85 f6 75 30 e8 9b 2a 8e fb 0f 1f 00 31 c0 <41> 89 1c 24 41 89 c7 0f 1f 00 e8 87 2a 8e fb 44 89 f8 48 83 c4 10 [ 250.953387] RSP: 0018:ffff880191c9fb20 EFLAGS: 00010246 [ 250.958743] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90008841000 [ 250.966175] RDX: 0000000000000193 RSI: ffffffff85ede105 RDI: 0000000000000005 [ 250.973436] RBP: ffff880191c9fb58 R08: ffff8801c85f4780 R09: 0000000000000000 [ 250.980701] R10: 0000000000000003 R11: 0000000000000000 R12: 000000000070115a [ 250.987955] R13: 00000000028e100e R14: 0000000000000000 R15: 0000000000000000 [ 250.995231] ? move_addr_to_user+0xb5/0x200 [ 250.999552] __sys_recvfrom+0x3ab/0x5d0 [ 251.003545] ? __ia32_sys_send+0x100/0x100 [ 251.008047] ? wait_for_completion+0x8d0/0x8d0 [ 251.012640] ? __lock_is_held+0xb5/0x140 [ 251.016709] ? __sb_end_write+0xac/0xe0 [ 251.020681] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 251.026211] ? fput+0x130/0x1a0 [ 251.029484] ? ksys_write+0x1ae/0x260 [ 251.033370] ? __ia32_sys_read+0xb0/0xb0 [ 251.037431] ? syscall_slow_exit_work+0x500/0x500 [ 251.042273] __x64_sys_recvfrom+0xe1/0x1a0 [ 251.046497] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 251.051507] do_syscall_64+0x1b9/0x820 [ 251.055390] ? finish_task_switch+0x1d3/0x870 [ 251.059874] ? syscall_return_slowpath+0x5e0/0x5e0 [ 251.064795] ? syscall_return_slowpath+0x31d/0x5e0 [ 251.069720] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 251.075078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.079916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.085099] RIP: 0033:0x455a79 [ 251.088273] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.107801] RSP: 002b:00007f7faafa2c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 251.115510] RAX: ffffffffffffffda RBX: 00007f7faafa36d4 RCX: 0000000000455a79 21:58:37 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xe000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x6100, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001480)={@mcast1, 0x0}, &(0x7f00000014c0)=0x14) bind$xdp(r3, &(0x7f0000001500)={0x2c, 0x2, r4, 0x38, 0xffffffffffffff9c}, 0x10) fcntl$setstatus(r2, 0x4, 0x102800) ioctl$TCXONC(r2, 0x540a, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000180)={'dummy0\x00', @random="a31fe8e78072"}) write(r2, &(0x7f0000000000)="d5", 0x1) dup3(r2, r1, 0x0) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) [ 251.122767] RDX: 0000000000000065 RSI: 0000000020000240 RDI: 0000000000000015 [ 251.130116] RBP: 000000000072bea0 R08: 0000000020000000 R09: 000000000070115a [ 251.137381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 251.144635] R13: 00000000004c0a41 R14: 00000000004d0dd0 R15: 0000000000000002 21:58:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x8}, &(0x7f0000000180)=0x8) socket$l2tp(0x18, 0x1, 0x1) r4 = dup2(r1, r0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x10001) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="65dd3f2e050e00ffaac75866b9800000c00f326635000400000f300f01c86526af0f0117ddc7440f20c066350b000000440f22c0f20f1b51db", 0x39}], 0x1, 0x0, &(0x7f0000000580), 0xfffffea) 21:58:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="6198fbb54f186dfcf444099fd86320fa", 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='dummy0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x2}, {0x6}]}, 0x10) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)='bpq0\x00') 21:58:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x5a47c323621bf620) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1c5, 0x2000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040)=0x1000, 0x4) 21:58:37 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xffffff80, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:37 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0xffff0000}, 0x21) 21:58:37 executing program 3 (fault-call:7 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x117) 21:58:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 251.496208] jfs: Unrecognized mount option "u" or missing value 21:58:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 21:58:37 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xe00000000000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 251.559346] jfs: Unrecognized mount option "u" or missing value 21:58:37 executing program 0: r0 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) 21:58:37 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x4}, 0x21) 21:58:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x21, &(0x7f0000000000), 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x2e, @empty, 0x4e21, 0x3, 'wlc\x00', 0x1, 0x7fff, 0x49}, 0x2c) 21:58:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0xffffffffffffffff, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 251.709441] IPVS: set_ctl: invalid protocol: 46 0.0.0.0:20001 21:58:38 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xf2ffffff00000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:38 executing program 4: rt_sigpending(&(0x7f00000000c0), 0x106) rt_sigpending(&(0x7f0000000000), 0x8) 21:58:38 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0xfd00) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x24401) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x7fffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r3 = fcntl$getown(r1, 0x9) kcmp(r2, r3, 0x1, r1, r0) getsockname$inet6(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f00000000c0)=0x1c) [ 251.779663] IPVS: set_ctl: invalid protocol: 46 0.0.0.0:20001 [ 251.788584] jfs: Unrecognized mount option "u" or missing value 21:58:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x200002a5, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 251.828770] jfs: Unrecognized mount option "u" or missing value 21:58:38 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x4000000000000}, 0x21) 21:58:38 executing program 1: r0 = socket$inet6(0xa, 0x8000a, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000140)=0x1) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="0f0fe8b70f32b820018ed0ea00a012002e0f07ba610066b80000c0fe66eff30f123467660f73f30f0f01cb0f06", 0x2d}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="010000f260af322b02941ae8b4083a3c0000000000b6000040000000007f0000"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) mlock(&(0x7f0000ff0000/0x1000)=nil, 0x1000) 21:58:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 251.996474] jfs: Unrecognized mount option "u" or missing value [ 252.039393] jfs: Unrecognized mount option "u" or missing value 21:58:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="c6a34e987940ea478d9bd365b9e4621e334652733324b7773a3df8a7504d9e18e2e4a839fcd9030000000000000028945d12a9caae603ff81c4dc32ed3d70fb5d4c5b866305249060000005277822d0e0616a2e5b74c48e38b9936f298c6feec95ad327c724ec507bd34b94e99623f014bf81ea54900ac54a99aa04e1a7f000000e8d3bfa2f3abce9736aac3e0b19d5a697bc438cd49bc1cf3af72c2180bbee78e9a7237c02e10ac77e3a4fd8a6e2bdca6a9a1d7da1a3e559fdafb6703c73b3c4c10865302fb324f16327996273625d9f0a54ef16bdb08f22ed11fd80b74eb861aebe51b0912c0f79486c25c49524ffe4f00", 0xf2, r1) request_key(&(0x7f00000006c0)="646e735f7265736f6c7665720005083f7605beb89ebb55f56950196fd8b8a6ebddf637ee27ef0aabbbad7523dacb0ab4baaf14787b652566f6eaf50a9d4cff3e30f2d07fd0118cf06573e05f283ef26ec0cc75cf93fe4c95c7185cb70df302c4c08871883fc063c014d46b8b27fd88a01e760bee664a475d69d12e2fc7e3dc680e3bb87b71d301fbf92cadf5537bc8774141ee7d7152d16c9ee5ef389b527a9b31679b1560e4680fcfd95743ed5305a984645fb4371e5e363f7df35cb72f6d9c953cd2ea3167c037567f7f99399e92ba02db513f40a4d44e072bf5ea9495287934a503a032610a0235c3530cfc99e27a1e10e28ed49beb223bbe910fd417a48e64dbdf97edb9363e6b5853e1323d6f78d0fb80969de2f5fec97acbb11c1ae97f54cf4e3ef9d50e1fbc43cc27e537d18452001232814ac3970ee2938175a91f4e0ca28b803a350dbea3b68d6a71bc65b011a81834b809f86919e4499a53ff8a35993b333b9b2761a44bb4a888a90c078d0b923e28cdbf76aa3fb68394de930dddf27c48926ab9c66951b70ebd4063b510ae453059ff71853bcf5942b5140a111d4a2afbaf612c6415aceb9578cb0d1decc8001f6dfc9d6829dbed2a8dbbc4bc9391960c1bb3fb451d52778143fb3c2f4d17df3c295117e13889037aff061ff283cac330aa03e7d189f01bfd03e68532d5594ef0e4bf1d584c7eacfd53a7ae8ccecc1901c89f4db4a3f1925610f22dac4570169b7f9f4cbf3fa1376f0ce4ab31605a16aff95c1bda1b96b9ded911a38594c3d9b42e7712ac377f377cd30eda00efd15d718e20dba3e76c4850966353c04a178e3b857719f9d81dc0ef8776c46c47d38aad73498289bc0240", &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3, 0x10000500}, &(0x7f00000000c0)="af2019dcc2380b4623dc8c7a581973a96d57452035fca47b18e7992f4c82e608a92c747d6e80519f2f5a436783ee4e3264245238b946a4a11d39b7873e5f3296185625d49ae13974d13940d0c01a5029b35aec2234864afd4648", 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x80800, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000640)={{0x2, 0x8}, 0x20}, 0x10) 21:58:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syslog(0x5, &(0x7f0000000000)=""/55, 0x37) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x0) mprotect(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f00000000c0)) 21:58:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x6, &(0x7f0000000480)=[{&(0x7f0000000000)="0b93adce6d8ed549375c1c4d03a12ddb19b0002c10a9cec9833c84ef97eb8931f1260c00d125ac26e1ff5e7059e50b80813583b87692bd01141447c18127ea4f95d18946813836eaa4caa9203485d12d", 0x50, 0x8000000000008}, {&(0x7f0000000540)="9788cd0f23fe8df0fb6d6a215c9847ca3cabe49ffaac757fa494b1be41832ac9d62330e914f622e140a647e4515125ae477875b686cc915aca5cd509", 0x3c, 0x1}, {&(0x7f0000000140)="761742a713ac49a1c7f557aaef33b3d28d29a2a9a3f4c903010f03d706bf2ce501900aa47fef42e0ddd2e82aace60a67e94e2a9014ddaa27f072ffa7aa0860192dc3bf2e0d3e363f9f6197f60bb75330738a38e1cebc6845d563b585443c8b5d625f6a5d693e6390f7da4d9d725e9151563154838239b401aa0cf6cbc35929d7637489adf77fb7c078f0d954c4350feccbef453d82e9d51b73fac3e9dba5f6b11bb31797b1e5f550b063c093df073de8de3c770df9fc1d22c484169ef958b7fbbfa6f1b0d7fbc9aa39e06f60050000", 0xcf, 0x63}, {&(0x7f0000000240)="47b91273d40ad1e7953e4ba52030b490c7a45d7754f7b16ac736a98e58d701bcc93ee1cf263d61769dabce3c41378e75708e51141ca5070f325a5e51cbe37b6fe85f", 0x42, 0x57b2c85f}, {&(0x7f00000002c0)="48d92163ab82c1df7be15ce6f36413a0cee748c63ae30ef107969a09882ed20ece9fed9c621318bc0ea1cae2fc7f64b6e01e84d82b02d4dad9251b8a134638897c1df8e140663fe76ac3f178d1d799a8335e9da752184c065296576b9fe15b5e8e65e1615ecf6c30e19a2c38d5e1d02b0779a8fd029bee426f60fb63af860e918da28fef299f763f8e8d4f28eee4cb1cb393fb810660c724dade713e7d0b535f0c730c5d0590cbf03212ebe731b4d349c2481f8bf0abcad6498a", 0xba, 0x1}, {&(0x7f0000000380)="f00d1621346ec61344fab7f7c9959cbbfe063c3412fd2715eee7b5b37edc7e6b1080c150529ac827505e734c1a6854ee70c609bb0f6f79ff5b593d90dc427e5ddfbcdee9d90abc1d70d87b60b5bac9452fc77eb6156ac4450a44b87f17dc7909c3b027ee0d1e355f17b6de137e3eb59fa029694a716c204a9b32ab995813c20bc98c67259f205a7fc90cd9ee173de8e12d71e6fce34f0213eb41cab0a5b7d82ab3d8de8dea33f61eee7c423d7607cbaa881e7abf0c85bfdf3089453599ef0f93eb3687e733413b50d9656cb3b6e0fa99c96e704b576e75d9f414d28cb34b472a8710fd39e59658", 0xe7, 0x3}], 0x8000, &(0x7f00000026c0)={[{@fat=@dos1xfloppy='dos1xfloppy', 0x2c}]}) 21:58:38 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x80ffffff00000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x40000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:38 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0xffff000000000000}, 0x21) 21:58:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:38 executing program 2 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) 21:58:38 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x1a0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') unshare(0x2000400) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) sync_file_range(r0, 0x0, 0x0, 0x0) [ 252.467931] jfs: Unrecognized mount option "u" or missing value 21:58:38 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0x1, 0x8]) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000004c0)) 21:58:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x200000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 252.573613] FAULT_INJECTION: forcing a failure. [ 252.573613] name failslab, interval 1, probability 0, space 0, times 0 [ 252.585170] CPU: 0 PID: 13710 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 252.592548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.601936] Call Trace: [ 252.604549] dump_stack+0x1c9/0x2b4 [ 252.608217] ? dump_stack_print_info.cold.2+0x52/0x52 [ 252.613439] should_fail.cold.4+0xa/0x1a [ 252.617536] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 252.622658] ? finish_task_switch+0x18a/0x870 [ 252.627164] ? kasan_check_read+0x11/0x20 [ 252.631318] ? do_raw_spin_unlock+0xa7/0x2f0 [ 252.635725] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 252.640307] ? find_held_lock+0x36/0x1c0 [ 252.644374] ? check_same_owner+0x340/0x340 [ 252.648682] ? rcu_note_context_switch+0x730/0x730 [ 252.653626] __should_failslab+0x124/0x180 [ 252.657859] should_failslab+0x9/0x14 [ 252.661663] kmem_cache_alloc+0x2af/0x760 [ 252.665797] ? __sched_text_start+0x8/0x8 [ 252.669950] ? kasan_check_write+0x14/0x20 [ 252.674184] getname_flags+0xd0/0x5a0 [ 252.677977] user_path_at_empty+0x2d/0x50 [ 252.682128] vfs_statx+0x129/0x210 [ 252.685668] ? vfs_statx_fd+0xc0/0xc0 [ 252.689464] __do_sys_newstat+0x8f/0x110 [ 252.693620] ? cp_new_stat+0xa50/0xa50 [ 252.697494] ? fput+0x130/0x1a0 [ 252.700774] ? ksys_write+0x1ae/0x260 [ 252.704566] ? __ia32_sys_read+0xb0/0xb0 [ 252.708624] ? do_syscall_64+0x9a/0x820 [ 252.712589] __x64_sys_newstat+0x54/0x80 [ 252.716640] do_syscall_64+0x1b9/0x820 [ 252.720521] ? syscall_slow_exit_work+0x500/0x500 [ 252.725354] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.730281] ? syscall_return_slowpath+0x31d/0x5e0 [ 252.736189] ? retint_user+0x18/0x18 [ 252.739899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.744753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.749930] RIP: 0033:0x455a79 [ 252.753104] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:58:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x4}, 0x1}, 0x0) 21:58:39 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x40000}, 0x21) [ 252.772340] RSP: 002b:00007f6596f1fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 252.780037] RAX: ffffffffffffffda RBX: 00007f6596f206d4 RCX: 0000000000455a79 [ 252.787293] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 00000000200000c0 [ 252.794552] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 252.801818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 252.809208] R13: 00000000004d9adb R14: 00000000004d3968 R15: 0000000000000000 21:58:39 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x5, 0xffffffffffffffe1, 0x201, 0x9, 0x17, 0x0, 0xf59, 0x4, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x100000000, 0x3, 0x2, 0x4, 0x8000000000000000, 0x7, 0x7, 0x2, r2}, 0x20) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000200)=""/177, &(0x7f00000002c0)=0xb1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000300)="96d188d8a1b73df3f397b34f171e4a19e1640165961dfb6c5b4ffb0c911591b6081a98866847ea19a4eaceb4e17eac0989e2623828df7f3481247eac8fa6872aa9d1101fea3e8e57772c2351b3e80e6bbb52309b77f65bf842e5f2475ffb9c9e5e5d91608a3e6ccd74259f94f9e3c67f8430be40b60e367007b907a5fe1f9dd9ca9427f0ef653965cec7df", 0x8b, 0x20000000, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000000c0)=0x400, 0x4) [ 252.831760] jfs: Unrecognized mount option "u" or missing value 21:58:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfsH', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xfffffdef, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000022cecd4ddb68087b1a00130000000000000000000a05000000000000df0f997c60f512c8591efd94a9c2432cf90483a49080ebd8dccc3372686fe854a9befd949f44f316dfbe0862f3c51f6bfd44ce6b6721930ba32c66ceace5687e0200222a948793633c8377a57e88fc5cc4402018e4f90b22058283d78a317e2fcb8ccb0248f94bdfa2ec2f8e1d905cdb32683fde719dc717cfaef81a02f5db1d54f015bfd1603e7957ba449c60cf5e0733", @ANYRES32=0x0], 0x24}, 0x1}, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x101000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)=0x0) getpriority(0x2, r2) 21:58:39 executing program 4: pipe2$9p(&(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) write$P9_RREADDIR(r1, &(0x7f0000000d00)={0x30, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0xd, './file0/file0'}]}}, 0x30) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0xb, 0x29, 0x1}, 0xb) socket$inet_dccp(0x2, 0x6, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x100c00, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) r2 = open(&(0x7f0000000440)='./file0/file0\x00', 0x7ffc, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100)=0x8001, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) 21:58:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x800) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x14400, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000000c0)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r3 = userfaultfd(0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f0000000040)=0x7, 0x4) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x1ff, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={r4}, 0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000000080)={@local={0xac, 0x14, 0x14, 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f00000002c0)=0x44) close(r5) dup3(r1, r3, 0x0) 21:58:39 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x4000000000000}}, 0x21) 21:58:39 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x1000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x65, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:39 executing program 2 (fault-call:3 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) 21:58:39 executing program 1: r0 = msgget(0x1, 0x288) msgsnd(r0, &(0x7f0000000040)={0x0, "895bd43eca19ea37d87b871ee4e308edb9867bf8dd8b12fb425d704747062f5aaa81719172c96f8b08f6cc2ed4b70d1e9206868b09bba6d840353bfa6bc5084a4e2c74017cd6ea790d758a70634f1e7e5e6d13c1f4a1655074f45deee6fe67b31e4fdd27cec8f01c76ad4e2eeac76b77d215071aea68f948c14f249e2a7a0d32041ab5378c31ff"}, 0x8f, 0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000a4c000)={0x10}, 0xc, &(0x7f0000ff5000)={&(0x7f0000000140)={0x1c, 0x25, 0x3, 0x0, 0x0, {0x1}, [@nested={0x8, 0x3, [@generic='\n']}]}, 0x1c}, 0x1}, 0x0) 21:58:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfsh', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:39 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0xffff000000000000}}, 0x21) 21:58:39 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x80ffffff, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x20000000000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0x4030ae7b, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1ff, 0x400000) recvmmsg(r2, &(0x7f00000013c0)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/113, 0x71}, {&(0x7f0000000180)=""/186, 0xba}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000280)=""/46, 0x2e}], 0x4, &(0x7f0000000300)=""/102, 0x66, 0x81}}, {{&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/82, 0x52}, {&(0x7f0000000480)=""/200, 0xc8}, {&(0x7f0000000580)=""/65, 0x41}], 0x3, &(0x7f0000000640)=""/206, 0xce, 0x7fffffff}, 0xffffffffffffff00}, {{&(0x7f0000000740)=@nl=@unspec, 0x80, &(0x7f0000000800)=[{&(0x7f00000007c0)=""/50, 0x32}], 0x1, 0x0, 0x0, 0xadab}, 0x7ff}, {{&(0x7f0000000840)=@nl=@proc, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/252, 0xfc}, {&(0x7f0000000ac0)=""/112, 0x70}, {&(0x7f0000000b40)=""/250, 0xfa}, {&(0x7f0000000c40)=""/63, 0x3f}, {&(0x7f0000000c80)=""/31, 0x1f}], 0x6, &(0x7f0000000d40)=""/58, 0x3a, 0x2}, 0x80000001}, {{&(0x7f0000000d80)=@pppoe, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000e00)=""/28, 0x1c}], 0x1, &(0x7f0000000e80)=""/250, 0xfa}, 0x6}, {{&(0x7f0000000f80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001000)=""/24, 0x18}, {&(0x7f0000001040)=""/5, 0x5}, {&(0x7f0000001080)=""/182, 0xb6}, {&(0x7f0000001140)=""/116, 0x74}, {&(0x7f00000011c0)=""/36, 0x24}, {&(0x7f0000001200)=""/120, 0x78}], 0x6, &(0x7f0000001300)=""/139, 0x8b, 0x10001}, 0x8}], 0x6, 0x0, &(0x7f0000001540)) socket$key(0xf, 0x3, 0x2) 21:58:39 executing program 0: capset(&(0x7f0000594ff8)={0x19980330}, &(0x7f0000244000)) r0 = socket$netlink(0x10, 0x3, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/205, 0xcd}, {&(0x7f0000000100)=""/250, 0xfa}], 0x2, 0x0) connect$netlink(r0, &(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x20}, 0xc) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x2, 0x20000) getsockname(r0, &(0x7f0000000300)=@hci={0x0, 0x0}, &(0x7f0000000380)=0x80) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, 0x9, 0x4, 0xfffffffffffffec5, 0x0, 0x3, 0x40, r2}) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000280)) [ 253.556344] FAULT_INJECTION: forcing a failure. [ 253.556344] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.568206] CPU: 0 PID: 13810 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 253.575698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.585064] Call Trace: [ 253.587679] dump_stack+0x1c9/0x2b4 [ 253.591342] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.596565] ? trace_hardirqs_on+0x10/0x10 [ 253.600847] should_fail.cold.4+0xa/0x1a [ 253.605260] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.610422] ? trace_hardirqs_on+0x10/0x10 [ 253.614704] ? graph_lock+0x170/0x170 [ 253.618537] ? lock_acquire+0x1e4/0x540 [ 253.622533] ? __fdget_pos+0x1bb/0x200 [ 253.626451] ? graph_lock+0x170/0x170 [ 253.630290] ? find_held_lock+0x36/0x1c0 [ 253.634380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.639934] ? _parse_integer+0x13b/0x190 [ 253.644109] ? graph_lock+0x170/0x170 [ 253.647941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.653531] ? should_fail+0x223/0xbed [ 253.657451] __alloc_pages_nodemask+0x36e/0xdb0 [ 253.662182] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 253.667309] ? graph_lock+0x170/0x170 [ 253.671137] ? find_held_lock+0x36/0x1c0 [ 253.675235] ? check_same_owner+0x340/0x340 [ 253.679586] cache_grow_begin+0x91/0x710 [ 253.683754] kmem_cache_alloc+0x689/0x760 [ 253.687906] ? find_held_lock+0x36/0x1c0 [ 253.691974] getname_flags+0xd0/0x5a0 [ 253.695780] user_path_at_empty+0x2d/0x50 [ 253.699934] vfs_statx+0x129/0x210 [ 253.703469] ? vfs_statx_fd+0xc0/0xc0 [ 253.707279] __do_sys_newstat+0x8f/0x110 [ 253.711329] ? cp_new_stat+0xa50/0xa50 [ 253.715203] ? fput+0x130/0x1a0 [ 253.718471] ? ksys_write+0x1ae/0x260 [ 253.722268] ? __ia32_sys_read+0xb0/0xb0 [ 253.726380] ? syscall_slow_exit_work+0x500/0x500 [ 253.731220] ? do_syscall_64+0x9a/0x820 [ 253.735184] __x64_sys_newstat+0x54/0x80 [ 253.739335] do_syscall_64+0x1b9/0x820 [ 253.743218] ? finish_task_switch+0x1d3/0x870 [ 253.747700] ? syscall_return_slowpath+0x5e0/0x5e0 [ 253.752616] ? syscall_return_slowpath+0x31d/0x5e0 [ 253.757537] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 253.762899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.767732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.772906] RIP: 0033:0x455a79 [ 253.776078] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.795491] RSP: 002b:00007f6596f1fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 21:58:39 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000040)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', r1}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/136) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000280)=0x6, 0x4) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r3 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000003c0)={{0x7, 0x1, 0x8001, 0x3, '\x00', 0xff}, 0x4, 0x200, 0x0, r3, 0x4, 0x4, 'syz0\x00', &(0x7f0000000340)=['):\\em0\x00', '\x00', ']vboxnet0posix_acl_accessmime_type[self+wlan1GPL.proc-.{^%\x00', 'vcan0\x00'], 0x49, [], [0x0, 0x6, 0x7, 0x9]}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000540)={0xffffffffffffffff}, 0x106, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000005c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0x80000000}, {0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, r5, 0x2}}, 0x48) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000006c0)={{0x3, 0x7, 0x0, 0x1, 'syz0\x00', 0x81}, 0x3, 0x30000001, 0x400000000000000, r3, 0x4, 0x7ff, 'syz0\x00', &(0x7f0000000640)=['*cpusetvmnet1{cgroup$\x00', '):\\em0\x00', ']vboxnet0posix_acl_accessmime_type[self+wlan1GPL.proc-.{^%\x00', '/dev/adsp#\x00'], 0x63, [], [0x9, 0x4, 0x517, 0x5]}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000800)=""/3) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000840)=0x6, 0x4) sendmsg$nl_netfilter(r0, &(0x7f0000000dc0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000d80)={&(0x7f00000008c0)={0x49c, 0xe, 0x8, 0x4, 0x70bd2a, 0x25dfdbfd, {0x7, 0x0, 0x6}, [@typed={0x8, 0x21, @ipv4=@rand_addr=0x6}, @nested={0x48, 0x20, [@generic="dec9fcc9ccf2e1a69a3cc6cff538bf09ba499ff20c36d74a651cfef1fec2a7e153145194d7d41ecbaa1e24be332c00d188142fcbc3d80d675bf4bf203827dbdbdf"]}, @generic="176d4a0e1f1daf97271509369b121b4d22540f40e6904f2668b27d3ea5a5b2782102773167", @nested={0x244, 0x57, [@typed={0x8, 0x2c, @str='^\x00'}, @generic="7ca9805c115ad3332e86b7d6f79cc41422b8f976fd95734dd881fcff3e2118024d0e164365cf6186159a07909421eeb4f42f56f94bf1fe9336ae15df8f24338b5d04c4d673b4632ebc0c61c591c77cd750387b9b664a2663706edbdacad786233a803b296543b7448ebe9173d635f9694280f35ca22480e661d676295fb708e794df46b3447674b874ef8c18a7bdcf2d1541450b0d338ae2af541ce73463746cdae38faded55c929530972e26c12ff686efc1f797d02a62e18c08e389c8ff49937b0b14a84e666c2527d64", @generic="45c37894b32f5fbc9d0d39a0755b4eb106a684f2e1e6658fcd1b84ce8fa2f2d480031d7648c39a48565542c70afa509201027d3fa8a24c3383235b2bc91a650743b2ad308429336b3b0ca69328080af877d4112b1bafb59bb4ceaf9fcb4f1c65cab24202b91bd3492cf345a2453d282bd8e5c1de16e8672dcf5cf14bb08004434dcd6a32d600986007a499727b6d2b1d5130997bb7acfe5a0526b9a655e1", @typed={0x8, 0x27, @uid=r2}, @generic="ac4ad76c29cd5f7ba4d30bdba57694f81a740324dcfb42b2e45ea83fe6b095de12bbc47baaf14c2c1a6b66154ea0e08db46dec0f402394ecd82a3318cae0b5717ccb90399e15c9076ef097205560bf8135c8008576f6d8d24d6b777563a6c2cf9a0e8f6b7659c99b836d0272607f159850f9b3bbca2c4c828dbf19477570f6072614dbf294136db86d14886ec8dc8264c1ccc5564d0ffe40f3a45b8206a5f9100a69c91a7b9348501bd333bc9c5fa41c13c5f6663b5c9646ebdb36621d09f4c21843d4457aea"]}, @typed={0x4, 0x83}, @typed={0x4, 0x66}, @nested={0x194, 0x1e, [@typed={0x78, 0x7b, @binary="0aef3273e992f1b54171a8dda7b5a694030b0f78dde18a93f5b1a570c33e4856795e7ba0792d6675be5e0fda8121ba359ac7847778c7fa4fb0a6e1a16b0905787812b663f34016113b72908bda42f0197866b0efee2738a5674b3066e8c48ca016afdbbe4c8395413a4aeed0c60d4ab517c869"}, @generic="38bb6d4c8ac25a038d0b6492fdb050d576838c547e33c11f5994e289052bdc4268b88115ace1c88c29e283f56f9411fb6b111614e786d517a7646c77fef97d76a1d2f664024522", @generic="443ed383fd7c49da4fe65d5474", @typed={0x8, 0x8, @uid=r2}, @generic="b91d081433d9adebd696186af82e50bc5a62aeadca4361bbfa9719f9d2aa14bcfafb15c353967839c9545a526b82c3439f0542a751f6", @generic="7305c3facdbe517b96fc5edd21a5ea12097b718252433c7f9016cda38eba012631a1bf78e794efaa4fc793b0b74b7b13e6773095c94350deabec156b409949322f23e426a3347b361b4c88c4c174681eaa1dfb66c2fab22b7551f5bdde1dfaab6c84dead323c6cee83437b6e51ab330241b323e9764dc12cfbc6c3af", @typed={0x8, 0x7f, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, @nested={0x30, 0x4e, [@typed={0x8, 0x8b, @uid=r2}, @typed={0x14, 0x32, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @typed={0x8, 0x54, @pid=r3}, @typed={0x8, 0x1f, @pid=r3}]}]}, 0x49c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000054) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000e00)) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x12c0) r6 = dup2(r0, r4) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r6) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000e80)={0x0, 0x10, &(0x7f0000000e40)=[@in={0x2, 0x4e21, @broadcast=0xffffffff}]}, &(0x7f0000000ec0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000f00)={r7, 0xff}, 0x8) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000000f40), &(0x7f0000000f80)=0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r6) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000fc0)={'nat\x00'}, &(0x7f0000001040)=0x54) r8 = add_key$keyring(&(0x7f0000001080)='keyring\x00', &(0x7f00000010c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r9 = add_key(&(0x7f0000001100)='syzkaller\x00', &(0x7f0000001140)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001180)="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", 0x1000, 0xfffffffffffffffc) keyctl$link(0x8, r8, r9) getpriority(0x2, r3) sched_rr_get_interval(r3, &(0x7f0000002180)) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000021c0)='lo\x00') 21:58:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xe108e0200000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:39 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xe00, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:39 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x40000}}, 0x21) 21:58:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000000d0000400500000005000000000100000000004000000000010000000000000025000000ffffffff00040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000000000000d600000000faffffff000077acf52953203683b2e1f9755489a828cbca9f7732bf10e3d42fda73db9d3677ff42119927a30981340e1ead9701b8261513779e51747118b2455c4f66e6475e2177129084c3d68caacc17c2f27dbcb329b4389602a9a3a02877c190367993e67858"]) 21:58:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d4000000", @ANYRES16=r1, @ANYRES64=r1], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x18, r1, 0x601, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x18}, 0x1}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x109801, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x80380, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000003c0)={0x30, 0x5, 0x0, {0x0, 0x2, 0x3f29, 0xa6}}, 0x30) [ 253.803186] RAX: ffffffffffffffda RBX: 00007f6596f206d4 RCX: 0000000000455a79 [ 253.810437] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 00000000200000c0 [ 253.817691] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 253.824953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 253.832204] R13: 00000000004d9adb R14: 00000000004d3968 R15: 0000000000000001 21:58:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$sock_ifreq(0xffffffffffffffff, 0x8000000008b0f, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_map={0x20}}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) 21:58:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xf0ffffff00000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:40 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0xffff0000}}, 0x21) 21:58:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xe108e02, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:40 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x2000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:40 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x10000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000240)}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000000000000000081c00000010000000000000000"], 0x29) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x8c83}}, 0x30) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) 21:58:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x50, &(0x7f000000a000)) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/60, 0x3c}], 0x1, 0x0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000480)="1f", 0x1}], 0x1) r2 = creat(&(0x7f0000000080)='./file0/bus\x00', 0x0) dup2(r2, r1) 21:58:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) 21:58:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000140)) r2 = accept$alg(r0, 0x0, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) sendmsg$alg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000440)="1b1f21054f779b36c8e083c1790fa801d1239514a7", 0x15}], 0x1, &(0x7f0000000300)}, 0x0) io_setup(0x800000100000005, &(0x7f0000f69000)=0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f", 0x10}]) [ 254.505772] jfs: Unrecognized mount option "u" or missing value 21:58:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x20000008912, &(0x7f00000001c0)="0047fc2f07d82c99240970") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10000000400e4, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) sendmsg$nl_xfrm(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="c40000001900070400000000000000007f00001affffffffffffff000000000000000000000000000000ffffac14140000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\b\x00\b\x00\b\x00\x00\x00\x00\x00'], 0xc4}, 0x1}, 0x0) 21:58:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x4000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 254.547542] jfs: Unrecognized mount option "u" or missing value 21:58:40 executing program 4: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, {[@rr={0xc, 0x3}]}}, @icmp=@timestamp_reply={0xe}}}}}, &(0x7f0000000100)={0x0, 0x4}) 21:58:40 executing program 0: syslog(0x3, &(0x7f0000000000), 0xfffffffffffffde1) 21:58:40 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x4}}, 0x21) 21:58:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x8100, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000240)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r2, 0x7}, &(0x7f0000000180)=0x8) r3 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r3, 0x541d) ioctl$TCSETSW(r0, 0x5437, &(0x7f0000002000)) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x8}, &(0x7f0000000200)=0x8) 21:58:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xfffffff0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 254.769461] jfs: Unrecognized mount option "u" or missing value [ 254.833792] jfs: Unrecognized mount option "u" or missing value 21:58:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x840, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) ioctl$ASHMEM_GET_SIZE(r2, 0x80487436, 0x0) 21:58:41 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2000, 0x0) ioctl(r0, 0x37, &(0x7f0000000180)="087a6a56d003f458e2c8145dbbf0f65401749b9965e6737cb2a9b2aa983106a933cbbe7838bcfa308f5a8f") pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/40, 0x28}], 0x1) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffffffe3) fcntl$setpipe(r2, 0x407, 0xb0f3) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000140)={0xb87, 0x7}) 21:58:41 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xa00, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:41 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x4}}, 0x21) 21:58:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) sendmmsg$alg(r1, &(0x7f0000001c00)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000180)="3280", 0x2}, {&(0x7f0000000540)="817226d0c77d89f7d8f9c7b615021292d52063f35f45d9cf378eed90b0cd4eed89970baf1c5bb5e541aad3ec1d3050027e77bac6a5a79168f1d9f1baee839baa860e9bed2265089f700fe6ca5ee090b8511f8866be31a4429ce0682de548d61d8d36296bb3ee0d886294efba18aa85c960623bdfbbb0e6700329c4b713ec2be380b6e55a593e2a9749cd6448010a461108b4c16f306f42a9abb0b936c9d0d7691d805b7ccc9c6105f259fe389dc88af2ddc5397a4f", 0xb5}], 0x2, &(0x7f00000006c0)}, {0x0, 0x0, &(0x7f0000001bc0), 0x0, 0x0, 0x0, 0x400c0}], 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) r2 = semget$private(0x0, 0x3, 0x200) semctl$GETPID(r2, 0x3, 0xb, &(0x7f00000002c0)=""/228) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x80) sendto(r1, &(0x7f0000000600)="90f68a90e6db0e2da4a2f471ac873ff5b7818f4d89468d5705de209255c54fb73686638ecab87733c1d4186f9574b0c9fe8b71bb44751418cbd45d6e09b8f432bb36903f6eb0554df36e23c7d9058ea47c51fe401a1b4594584d90ad1e80303440893436a28e69e597953a55199d611af4881f37594dccf3de58862b91351e96f696d450b69ac29661cf01e473ea3d2c7a131f140aeecb060a3040e7e13ba63ca397f0f3083709980ecacde665216d93779383e99a64ad76271544eb0272a31f51dbe802551e469becac5a2b17bc42d7cd9c5eba947a02be19ef74cc5fb9ec8eed8acd8d4f965383c74060d304af89ca8580bc190e3e94d50625937580e0f13584d08736d57fdd7f52c48562f5bbb8946be316c01498bd08a20d2b9c9a7852df6ce9419f315d7568cae17c5609540861515d2a6d0fffc795e058d6d196aa8727674fffe2d4f6bb716832bba5cc2b2f06c340fa66cc187d6c0fe6ebe07a02b9c73a7efba2e1429207248fc7239496d845fa073c1d00dc353b082b0d5915cddc1a2b71533d922d7c4082ee5a0b44881c760641caccd45b0a66809dc99705ea98a319be69bbc016bdbcc27a84a62cdea2b4e8ba549a54001518576b06df3583d3984268a5ca863398848cc134b09a0d61432773bdcbb7cded1016451689c16bf720bbe73b867d5036068aff54d988224f0ff3702fb5796846b03dedb1e1db47b128f08035225fd1475a3cca593d2883bb20cf583bde11f89875d262f1d9ab84c705ce874d16b4a0ad92c737e0b28a90b085a07727a4dc7b005028a63ba4a1a3f19e1043a7f4e540858eafa7598124b146c5338e34d7916f21a74c4096feb16b6dc0fc4ed0e041da45220e03579868baf77049cacc84e86e9998e544221ce9e34e0ecc5d9607d6770ff710219ba2cec696daa69c2d97b3a7454815df5c64c338bbd8ad9680397d29a9fed4a364a29c938e14f518fe84d606aa160a5227a2265c12e33e1cf0f629bde5acae91c1207d969dc72162a0fe17522776dd13ecc6e5b8a357d9fcc473667a634fdf17298a74fe987133dbfc457548564036cae635142e5ff2a6e46338ed8300547a0ad4160349db29bb736acf870d486e7081b55cb0cba30cfbb85b90fd589485212d8d0896ed5b95a12c41e190b75fc7813c03406b771e9d0f6e05773b30fec891887a3f532a6e771fcd5db6337a158cb4431cda6116e6ca96bbc409566fee736bd1a28bb969ffd8a4130ee478fee3e82f3aa0f110bb99645a8a6afde25dd6647a619b2c71f2449f6cf7cba6069e0df04fe6f2314d55edfe29a57f018e6e18ae7ad085288ff33e7e18a7fd4d52fa96b8e4bf83dfa5565ac893f0bae0c6690dcea5d176bb39ffa20cea7b3af0d35ef9edd8bbebd7ed59b1c839749f322b9493a965381e304f022faa98a4c998cf71e0e3eca9ae2f740da2b12f9d97bd5c330518bbbb711313b7e348adfb7fb838029b57c081ea099ad6e11e92603ef0031f92d530a4314f69110eca7fb984135eeb69aaca38b64e748d0d177ddcb3bf31c7bde9c6d6158c63ba86120d3f237edf81e03cb5426a558705535ef754efbc887ad451560d81455e1c36b623d299d602efe4c0d65daa4d0f816fce60f22ac3852691ab1f10ed2b82c0403adb822e4678e2adfe0bb6063dcf629055e314ecb0e68c2cbd98a96716e3931b218d5e7d1071af1664ee10ce3694fdb33bcce9873f27981ca5bc3c57ec9a9cc7a3925f75a24e6002f313c8ee5f9f870d6f6a80821168e356090e745db99d84345765660c52da71dca889c19ce1680adadc4019de46c2786fb487514b4bc2032297ca2e216ec40749106be25d9770269a22659df2a8761eaf4ae981a167a0389e0380325f55432b9670e81c6b17080d68e8c6442ceb8dc13a49c1f4c22b4d0cfe40f3792229078808f4b4ad0b29bbc2ad2cf771771102e0d55b4789596d9f622f0ed2622376cad1e944d20c6931100129326f7f63972f967405ee6466413b6b1610faa2d3ba7ae4ed12e7235159a2a15e50a8e1f9697676aa3f8785f559683ddaaf2240cb1f2bfb18e001b584c92dca5eb2dc5267d37f5f238236919c88a094d6584edbce003e0b804ce05d2e68a73401212dfc5c57ff25c57c55aff45f52e3277a66362688af76d3a5ef01a6aa0f8b825efde4689ac1f32057790eea2cd4a789f2833e663041593154740b31f0a11dcbb588840ee8d7d1d6efe1e19e97971233859d9f8ec5076f0c8705d4588fc15101d7771f658bead6d5fba8074dba1937b7018d8fddfc5c6da527f270233638efbe2ede8a367f5c0da0c3af25c01fe19e0a5a287629b0139e3895dd3193f4448180c16f105227965ca619e9045cd3431fcba9ebf392c18298413f3da4b3dace488393edae61058237ceb4e8fdafb41428b46b8fcc60d8ea57b36081f2db7c5fbb9cd20311fd5399ff4c6eee82fae2e664808185762869c26420fadfe1deac090f62364a789e5326cfb6a05ccd88b129e76edda35c43d43aad24d0325becc3c2e2380b8e53e70c14db346b4f5717893d2bad10bc7af4d94ad7570e6847457e2988e256db0b7d8ec85effed91ccf7cc8d69c15e14fd275c49dac5e9b8d0413d1fa4829e051fb0f7a85d781bfb628ef613f5a9663d847240fcc77e5ebd45e8b6c4f314f81b6bd5a074cc222c793dbbe63a5a87885c00f8fa86a61d0ca60dbd31467bc06ff81a1fa0cfc2e821177e99332ce28400f4cf6695522dcc8e36541b64e0ac0792ed18df1f83bde1023400cf00e7cd89760d10d7698e8a2b8362f4266a76c155acdc07dd62b9c0b3faeadb5f7adf8eca6e342788c82483441f7b58b40ae30f97ef00e80d580037690e5e4522191720205cd81d33193814e29dc3ae262b52873717be9dc5ba4be5ecac5628b555019c925a4c597212072dbc3620d32045539bdd8a62234e74396e598e9f05d0e513ffe03131a90bbc9949aadf4bbf359e008f8aef5b705526820f571a99ac2f9320471fe9d42ca85f6e7b03681ca10d9d819654a74aa51e33331d1ef76da871bd5d4ee69736829b17f9a5219737ab2e5d03050f0f0d6ae8d0cc5c96ffee44a4544479005e0e87df260fdb4aedf6700d5a852db9fc205a5a506b27287595830e349c97ad9421ca143c8d28e4d373583708f0a5fb6801448f33762f4edba823140709811c7d2206b7f100f156902c7dcfa3fb5f50397f864e1f24cb9c2d24d72bf72aafb882e392aa90f04177a7b31120f1629bb40d0b3923b65007c9ca9a72623a5307f2c7e31e76b011ff456e9e31a515109d6e956c4aad0c11549babb81ab506a9d41d63008a8d11d85968396f7eb1d9f475352aaad0fd328b4fe907acd4705e866f6c2e4b9f458fd4a7df8a76866ff1765952ad3cbb39bd3ba2e752bf342b4bc82ea610223f7f680b8b2b873fb3279b4640a4c2a2b4106475f893b3642e77bcc6c564240d34c732ab91464ecf2f81c4f9c617067ebf7e878488f74550846621502f93f680929a5718ea86e6bb7e39d327b090c9fff76a8908b0545e112e3f7162772e5868fa3f15d9943bf4e866545a83caf0149742a687b3e8136d0ec6b1fb8580604509e51ca14cf15ad3823f3b0ca43142a59bc2b22d4dd244aba8831207beec11c11ee2a3b1417c8a2bbfc1ddd9fca9b3cfcec0802f70c5fa3049feac84a4db0ca2bdf512d28f567416036d25991540c31d4b0ee38d484268c77f9198c9f914d20e48dde936476dedacb5d3ffc3e5bd862bcc10599174c05336b22bdb718d08b49f07afcd41eaf8d80825df797fe7a6b8083470b3b8d76519cb8c0f983a9b2672d66bae71aaae1fd7df7299cc784b51b4c095625a494102acdffafec3a20b18b0ec33261fec0387f013e75e21e7b7a4d7de9c9ec6cd7437e2f48e2d3c96210d48c64b9b0f632f2a478c09408c437772873bc251ca0b71709329398dbb98d48428ff9c7768b662fdd609de1c2037293f7c809f633688c97567f0569173d8a352c66470b0fe3f5632a5b704df8b02adba541306ad151ae08f58334fd4c9e65a1827d6d686b18121c65526ad19a2a8e4f4158b290c15379d2c8398ee2f654f49cdc3a7b0f69fd3cfc0ea1cd89f82fb64ad22dd486c943a3d1038881f180d52cbd885694942c06b90ba2ff2685840ec0efb9e21e9b5bbdf9686a39123dbe623530409b993c1818c123f9e884a3ee98cafd1511ca669e0fcf9972784b3e3f853e7b780ff5fdbf22ff1218c22666af03afb5ec6eca76ce45a8febdab04812a9ea165eb5f91d1b07d158a0be22a7b5c882d7c6cfeb7b5b00845cc2ddacba81fc5208db97946f8983759db8be6259ba51b45fec8ba6bf1affec3e5943268d443d7167bd35fd1339bb4e72505b236e8f649b89331bc55cda3907f0aa90b7e54350ee7adb12bc0d45c3efae1c844099a32f4db04b2cbe187c0d6569343463ec5f152828443a1e7145ad6129f7ff06d8293b09818b735f696324eca5136b929feba641e7766f40bfeb1dd5b7c83cf84afcf109fc7fa8532aca7131308aea78f114dce4c81b9e5b16fc884b360a9da7ff4975fb64172255c7774fcacf7a061d19e307e3a181df9afa90a0276ae744dd57b2a7de116de24c10b96c67ef44583f4e42db7e42b0fdce9b75adcf5368f3ff90c2919090ce67e96ad1d4df37716c4b313fef63a9499c3b99ec05aea434a1504587f947a3bc9c2cf7cad3c5784a97b8611c5d5dcd0fd8becdde0702742f6d2a85af2cf5153e9bd29cd90630865544ea50ab2686a9d1fa66616b3e683137379af77186c7610116d40dd751355f4145bdce543c03d2d84bc836813370633f3d12800d973e67a5c4d982a7cd77d791e755974c02df5b47f0e30f67a37a1f4bca70712bee54fc3b8975eed505fe640ffb8ccc14e24c2123557edadc4b92f886b1989293bdc1d9dda6c7682c342677baa38bd66499bec928bed34b664a1e8ab996dfbd9cde6c91c45f27068ecbdd38a36f63f5650473b696d72c8ed125fd211e37c0988f2fe979e1d1e78457554455f6f916db76e5e5959987fbaaec5de61ed5f9b6891bcc9f34fb6543a57ae9ff46cbb855343edae0fe24bcfb07eaf9c4e7046dfe22515659bb94fb802bb13997ee4ee0b53d2e994353ca38b9eea4ab5fd04577ec9f192efd4d79bc76c262ef9a2b0fe3f11bf3c48ea3f896865e914defed1da49e781f099bf05d7f0ae3356e72c9a666cb57bd7ffefc9da2d7123df640c733b456e5fce78b13770d4cbd496f9325b003b0b3c219682f0ef896bab2c4b31ae850952ffb6192974ee16efbe742b5c72cea9ef8a7bbe50513fb170c168e5d1e77c07bb5126e1a4a3c8728366f53f031f64b36ca64dec6e200041e12246382a5759bba5fe66f01f25fea02f6000256870c9728d57573f704183de8e30ca28b4ef39ef86050724afcb7ee4f72fab62c6025f3139990fe6e2114955fd445a254e68ba81007db1ceb4ee170ccb57451e9093f44bb40fed09909b96297f6d9808cffe14e7077cfbf2911bab4a28ac283e2d13c90a92c8f7dd747e9b55662c71093cfcd602979153a684b3f258e503157c53985d606bad57cd7aac91c4ce9eb38e2a137d0ec7a83b2953c97703eb1196d7c950b1d04020b83915c0edd6eb7fcb1a1ca5c4afa213a897b6a46e3056e0ce823f560a61eea6bff336be21718f02e58a5f5043e6aac8fe6228bc9ec7dbfda8d65ee06cd57c8b7f1ca623a209790d9e9723cfc66bd61b8b8da016c76f3f31823c891a00168ce4233902448dec4de4293fadc39a52abc92364dd4abdfa5", 0x1000, 0x4000, &(0x7f00000000c0)=@nl=@unspec, 0x80) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000080)=0x6) 21:58:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x4000000000000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@allow_other='allow_other', 0x2c}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='security\x00', r2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e1519fa00e8992aeed7d8eb67a4817b7e29635916873cdc74bbe32f31bb671e0eb8386c70"], 0x118) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000700)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x114, r4, 0x0, 0x70bd2a, 0x25dfdbfc, {0x11}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) [ 255.565781] jfs: Unrecognized mount option "u" or missing value [ 255.597320] jfs: Unrecognized mount option "u" or missing value 21:58:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000440)="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") r1 = semget$private(0x0, 0x4001, 0x0) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000100)=""/152) 21:58:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x8000000000000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:41 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x4000000000000}}, 0x21) 21:58:41 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x4}}, 0x21) 21:58:41 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x2, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'pids', 0x20}, {0x2d, 'io', 0x20}, {0x0, 'pids', 0x20}, {0x2f, 'cpu', 0x20}, {0x2f, 'rdma', 0x20}, {0x0, 'memory', 0x20}, {0x2d, 'memory', 0x20}, {0x2f, 'pids', 0x20}]}, 0x31) 21:58:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xeffdffff00000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) exit(0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) rt_sigpending(&(0x7f0000000000), 0x8) 21:58:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000031c0)=[{{&(0x7f0000000140)=@can={0x1d}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)="1436430d48d97d3a32f6d8a3b38a641d2645315dde43a6bd599b18781b751695b1a8e759c119cf225c14fa707eba93bedb51b627eabdca61", 0x38}], 0x1, &(0x7f0000003640)=ANY=[]}}], 0x1, 0x48015) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xe5, 0x10}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000100)={r3, 0x6}, 0x8) recvmsg(r1, &(0x7f0000003580)={&(0x7f00000003c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003440)=""/112, 0x200034b0}], 0x1, &(0x7f0000003500)=""/106, 0x6a}, 0x0) 21:58:42 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xe, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:42 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0xffff000000000000}}, 0x21) 21:58:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="4300b5f88082", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14, 0xf5ffffff], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="20000000200001020000000000000000020000000000000000000000000000005a1a7dd5b50e6554fddad45e66a7b749d09a377520554961a1837582ccf9885fb7def5e0d0d6"], 0x20}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000200)=0xb) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x1, 0x20000000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xfffffffffffffff9}}, [0x40, 0x3f, 0x6, 0x80000000, 0xffff, 0x3, 0x1, 0x10000, 0x1, 0x80, 0x1, 0x88, 0x6, 0x3, 0x1]}, &(0x7f0000000380)=0x100) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000003c0)={r3, 0x5}, 0x8) [ 255.898582] jfs: Unrecognized mount option "u" or missing value 21:58:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x8dffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:42 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xa, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 255.956481] jfs: Unrecognized mount option "u" or missing value 21:58:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x81, 0x40, 0x4, 0x1000, 0x1}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e1519fa00e8992aeed7d8eb67a4817b7e29635916873cdc74bbe32f31bb671e0eb8386c70"], 0x118) 21:58:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673fc", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:43 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x40000}}, 0x21) 21:58:43 executing program 4: prctl$setname(0xf, &(0x7f0000000300)="f2a9eac4eb1848700c7da799d0b682563530947609fef4165fef016d08fbd4aecd440637756ed33a85d835ea8c50816e5cc4802dedea1299f6213c624b7bb77cd6d5d5f3efd7646afe9b41ee4d83f85347407c1f2133d84d3bfd1fb6beeba9433525f443330543c220001b7fc76f04ec873a9657a00b9ba79043ce354b0fc85061a28652000911dd96071c859d7a56565de1cf56e75b4970641c301ef6d2fdd698201b1a807194beb18b80afe6023882ba928fb379647bf9d761452feba3e6263acc40fc6d36186f87aa414b0c5a82e7a5efab7c1bb2dc4a7cb10742194b473523e5d8c604b3e3963691387ebf9cca1a75564a4587d7e699dab435414abc835dc8133cb0ec6cbfbb13a0b083e443fe4b7f63e06a14bdf27dba5dc441000c754495f16fbedb4f8b34fcdb58053011a45c8cda67ee0b7d435a731dcb41c52863126ad2dc1dc3686b7ee45422f8f898b5eec241777aa2bde8401b23a5928bfbf46eece9ff") seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) acct(&(0x7f0000000200)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8800, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) 21:58:43 executing program 0: mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0xffffffffffff8000) 21:58:43 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x4, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x6500, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 256.806159] audit: type=1326 audit(1531432723.054:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 21:58:43 executing program 0: r0 = socket$inet(0x2, 0x3, 0xa) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x00', 0x19, 0x1, 0x170, [0x20000040, 0x0, 0x0, 0x20000070, 0x20000180], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xf, 0x10, 0xf9, 'bridge_slave_1\x00', 'syz_tun\x00', 'bcsh0\x00', 'team_slave_0\x00', @empty, [0xff, 0xff, 0xff, 0x0, 0xff], @random="04026d432c30", [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1e8) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000300), &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0x1000, "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"}, &(0x7f0000000240)=0x1008) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={r1, 0x9}, &(0x7f00000002c0)=0x8) [ 256.891852] audit: type=1326 audit(1531432723.078:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 [ 256.913377] audit: type=1326 audit(1531432723.078:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 21:58:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x28e100e, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 256.934642] audit: type=1326 audit(1531432723.078:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 [ 256.955885] audit: type=1326 audit(1531432723.078:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 [ 256.974375] kernel msg: ebtables bug: please report to author: bad policy 21:58:43 executing program 1: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) tkill(r2, 0x3c) 21:58:43 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x200000000000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 256.976939] audit: type=1326 audit(1531432723.078:13): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 [ 256.976966] audit: type=1326 audit(1531432723.078:14): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 [ 257.021425] kernel msg: ebtables bug: please report to author: bad policy [ 257.027284] audit: type=1326 audit(1531432723.078:15): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 [ 257.055360] audit: type=1326 audit(1531432723.078:16): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 21:58:43 executing program 0: clock_adjtime(0x0, &(0x7f00000000c0)={0xb00}) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x400080) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x9d85}, 0x1c) 21:58:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673fd", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:43 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0xffff0000}}, 0x21) [ 257.077141] audit: type=1326 audit(1531432723.078:17): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14020 comm=F2A9EAC4EB1848700C7DA799D0B682 exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455a79 code=0x50000 21:58:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080), 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000000)={0x3, "153ee9"}, 0x4) 21:58:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x800) r1 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x220000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x94, r2, 0x410, 0x70bd26, 0x25dfdbfc, {0xf}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1=0xe0000001}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xd1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x410b4a35}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffff9}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x8000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000480)={'vcan0\x00', 0x0}) connect$packet(r1, &(0x7f00000004c0)={0x11, 0x1f, r3, 0x1, 0xfffffffffffffff8, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1d}}, 0x14) r4 = eventfd2(0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={'team0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000340)=0x60, 0x800) read$eventfd(r4, &(0x7f00000006c0), 0xfffffea1) r5 = fcntl$dupfd(r4, 0x0, r4) write$binfmt_script(r5, &(0x7f0000000400)=ANY=[@ANYBLOB="2321ff097898c931"], 0x8) 21:58:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fsync(r0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1007) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sctp\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x28, &(0x7f0000000180)}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) 21:58:44 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0xffff0000}}, 0x21) 21:58:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a667303", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:44 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xdaffffff, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x2000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:44 executing program 1: r0 = inotify_init1(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) fcntl$setown(r0, 0x8, r1) ioctl(r0, 0x400000000000004, &(0x7f0000000340)="927c12773d22cd7c1d1c65e5ea469eee8f88cd69404b062a9367e31ab36951fcdf90b776318910310647929b0d3224ca2566880b3b98415dd79c26ab1d5f489650518a94196c686ac3377286fb01cc5d8f05a75298d00204fba1c44d9804c1a60e36bf57c26b29fb71cc133d3b407cecac34df72251492b42c8b3f55337c00b0dac1912e012d2f9b721e4387e2cf6f51c44dc3727673a6c3ca08f8156e6c7b1c7c4ddbfde71b82cb2e") fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0xfffffffffffffcc2, &(0x7f00000002c0)) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x80, 0x80000) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000300)=0x8) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x19) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000001c0)={r4, r5}) 21:58:44 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x4000000000000}}, 0x21) 21:58:44 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xffffffc0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:44 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000200)=@nfc_llcp, 0xfffffffffffffee3, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/11, 0xb}], 0x1, &(0x7f0000000100)=""/193, 0xc1}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005080)={0x0, @dev}, &(0x7f00000050c0)=0xc) r2 = dup2(r0, r0) write$P9_RLERROR(r2, &(0x7f0000005040)={0x15, 0x7, 0x2, {0xc, 'system+self\''}}, 0x15) sendmmsg(r0, &(0x7f00000055c0)=[{{&(0x7f0000000340)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)="901f70d29bd8819678be331a79af97bb8aff971bf4386fc26c8bd9f17fb156884d21cf9b15d2cabf6061cd309665a2d1662dc824537df28e373dc470767dc477eda31e90d4416c238c4a187e54fd7e449023a4a81c0cd44aa12d1dce713f8b5fcc4f8d56697e5ee7a52d33633b6a1dc98409c9570f9014588d1b1ffe55b2", 0x7e}, {&(0x7f0000000440)="cb40e3603919ddc6f3cccf76d84af4b1fad6bab6ca872937f1e84ae22a1abbaf5d763b497714fae426b1fbcf18aca41bacabc8390411369bc5c02aa94c790bed57f6b34306ec842ac1d1dc27bfcfd8c9f2dcdd9e9e838b", 0x57}], 0x2, &(0x7f0000000500)=[{0x28, 0x11f, 0x301d, "6b2b45142202cec3a313d19fca7f7123e6"}, {0xd0, 0x10f, 0x4, "6fe94f75630d4b9312621638bd5437b568fcca29fc45204afcd6036e195e0aaa076b218283fe71fbbf431aeb04548ecedae1981ef557724a70ff51222c67731978613eb8f5bab5e8d635fcc216850327775be11de1d80704d9fcbcde257611811c2cc3c8f0773bce55c1510e2b363170c45feee22d288d06aaafff224d316f12b3127b4425d370abc0cc84e506e9477a7b5041127b2e28940891ac75d96b1c2872ea30bb1df81de9ddc340c90a7f984f385313d94aec120b931fbf2d98c4d7"}], 0xf8, 0x20004080}, 0x6}, {{&(0x7f0000000600)=@ipx={0x4, 0x10001, 0x4, "ea0d512fdbbc", 0x8}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)="7d3a696ee6f381e737", 0x9}, {&(0x7f00000006c0)="2e281089f64bb315da51819d959e5ddbdf5d998ccc05c1776e031f96ee157ea7463cd9d478a047efe840e59676edc16cd6a590e5648a26e0449c1da51990eecab67b5be834a8777d31fcc230c350d3d55a5e2026cff207945c7cd7e60438e833da9177502ea609507672ad418e270e77d655519b7390b3ed3b907cff5ea3ebc7d99bba379b3023f2e773cd08979e8c8341601fb7c5436e20769f12a85db6d2a24f8691f7fcf5d84ad9e2842ed89d20f95d1f4f78c9c1255f1db565cbe878004099397be0c31610267c3327491c5902ab22695f44a027b21e15df431ca2b3e24a590a0ffaf227bb05b192bd39c3b834", 0xef}, {&(0x7f00000007c0)="872e935e9302994005c8008c52f7c71303ce4616bb7809821b8a0f2d920056f3405f", 0x22}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="edaae382d1824cc2c3ad146a5b48e5c60ec2eb26e39cf77c94ed709db253f04c1279b50783dd8ce855", 0x29}, {&(0x7f0000001840)="14d54603787a433e36909cfcfe2ff9da6571f16181755e7e18dcfa78c3461a564f651c2e0e3e1d0c0704e9d66d42c47b05f88e53c7c7588bf6a75de3c67b19ab391d1d935a9a681f5dc889268d661165d3bc8657ec39b2aef669e40e25ea47a4238262cdb1db42252c966d08b81350fe2593efb50971f538290373f8a4a974bae800be5fa0ca3ba022374eb1239c6a492ecdf349c52bd1e688fea8185648e16c98bf5ce7c8e1f80e0adf629633d4b5e0487289ee5f652d3960924e", 0xbb}, {&(0x7f0000001900)="db5759a737a6915ad3686b5262daa10574edc0d2446ca3fe9b6e5b494c49fe033bfd4ca6eec50cf9f5be15367e02070e5f36768de4ad6c800935b83f8bd2f817e89e638cbdb4315ca327fe70fb730d8572f89bfbd006c33ced7031f2e4e67940d41eeab975e5bdd4dd3e0e", 0x6b}], 0x7, &(0x7f0000001a00)=[{0xd0, 0x11b, 0x5, "50da777b06fea7ce38ae28b36248c838af998521c4b8b246a5b613375b694d8af3266cbcfd65403a5e663125d680eab0ab7a86776162a3a031e1bc7dfd08b069df28128499ffd6051b5ef7465f543a9378b2d85fa2c1e7ec4c59b5c726fb7b26e6df40ce6d27edd37cba93fe4aed6f46a8a1c2dbe4ea1ea155c1545dd4b83797e6666f3b6158a13f2956a7899873f940c585e6dacd65ebc66084321c2fba3aedb7b40f10133f8fd94c9be598e914a92b1b30975000049b2566509713bb9f"}, {0xf0, 0x119, 0x101, "63ac1f6fd40b348f5fbed5191241ee8c4b770d8c90834d6c1ae7aee7af684fbeaaa390d27c9c1fee8a6d92ede4ef0e01b606f30faa7fc0c1e0ffe1d9dc5f3873fa4a597eb9cfafe433766ff79aec176ceb0219ff75c17e403377120919aa6e5a7bfd16b0d6ad8cc083c268ba2c5e1ba0d05892a74bde69c88774fe3aa77cf9f096fdea8c3b26bd71e312e8f2dbc4520b13ec4b0e26acc6891f10bc261edb932669764922c1649b83af69665cd33852a63940eaeb84a01e3d1286d000ce32c2c5d723210faffa5dc47dd477f374a9a065bc465c920a683169c9"}], 0x1c0, 0x8000}, 0x80}, {{&(0x7f0000001bc0)=@rc={0x1f, {0xffffffff80000000, 0x3, 0x7fff, 0x6, 0xb1, 0xfffffffffffffbff}, 0xffffffff00000001}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000001c40)="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", 0x1000}, {&(0x7f0000002c40)="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", 0x1000}, {&(0x7f0000003c40)="48e211914a03f5ab6ae27cce3f0e832b0301b77ba22dca614d1a6d3a21a7c3d0923fe1a9667beab5d189bddbe691b88606b803f4f1f7d08ba844b38eec677a6cdcf415bdce1e69e7257c3af34db1977758e5e726120644942672ee7bc25ab39b34ab9a253e6d32ca0d490a2eb8275f53310ca877c15355fe5e6b1f24ebdea4ce4bbe8feca16884692c2ec01a58a3f4a1d4af9e05cde4dab675a94e2f83ba62db760247a16854a2959ce03f6f78a28b3ebb98ee69513194559ab7de62d38a2b58c11e0e0f39df433a4f66d9cb80fb", 0xce}, {&(0x7f0000003d40)="262df0b7edb1188f48b5fc2ccb99c03983a5a42f3e0808ceae74f9a6210f3db655d2c87e155d2c598defe897b98ef658e324d599e8afc822e7f1b8f5736f0618065d41c82659e78c319ff3a7ec08740db518a814be30e5c3ef575be3b3bba82573a310ab9b56e5a4df", 0x69}, {&(0x7f0000003dc0)="40df48fa1f2f0af35efa146d15172cd6f3c1c109ea8ed2aa2fef8f4f8eeadf7ce0622af273476c2520b6fc2ec3f89b914ec0733ad013ca727acb19495c806e4245e91ebb56e68e6818ca77b7ad86210322e717e3dd47c56b178f3a45b5d35b795cf27b", 0x63}, {&(0x7f0000003e40)="3b2d3155e49355a15ccbdf07f08c0fd9bdffb162ac904f8c260ec3abcfaecb0c7e7698e4af4bed271bd3f319cd30735d74fbfef7127bdb8ce4d90bbec220aaf62d1bad907715f4fb771ebc4b1150f1757c8d079a185a25f2cdfd0e5ac80a22a7acd27fbf1263abddea6facbeafc9c66111279fe0f930a7c8e4a34a0703ae908089eec23fa6f79b2bee96c212110ec268f26e52f6a74f49ed19900854dd4d6dc5c5bee22c294a844ac0cd7d5d75b94e23e03fec872209e0126214d19e955f9051cd9f64f432e43aba70", 0xc9}], 0x6, &(0x7f0000003fc0)=[{0x70, 0x11f, 0xffffffffffffffff, "7cdd66d6b3f58443cd0ff473d8f6b5ce1ae53e4a29d7a1a4c20fea82590f9a0360f23ab0ef896184c0d25d823935f9216b320e4fc60d8af31fae2253445b28277c134b47a262a42843855724efd0df5a5dd5303d7bd32e01fc1927ed5a37"}, {0x1010, 0x11b, 0x0, "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"}], 0x1080}, 0xf24}, {{&(0x7f0000005100)=@ll={0x11, 0xff, r1, 0x1, 0x6, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f00000053c0)=[{&(0x7f0000005180)="86bd0ec17b3320e1864d0ec9c562987e7bd79a409b0f4d66120f15a005a810eefc8d3d6c015a4ae66c89be9b77f40ed40e9ad5f29b015b7cbfe80bc3b027fa6dcb793f00fd3d8d22162376beb3e23665a5ff10c13f61e82a6ce47cc808507c7ee114f1cf0b6b6305a881bb488812c93d9154f7f77de01c5bd7064d5cb2a41431", 0x80}, {&(0x7f0000005200)="c7298ac31022f267b4f9ac2af6e23283c79ef71e8d191a37376c52d4b18734523bbf18f12a63b5825cf06ce9745a8eb88148db43a89dd052678e5cd0f754e57ada86af3f0b8b04a07fd471f8f580c9d27e1b150dd932fecc31d00ee654c22e427172548d3ce4ef12ed283c7d801fd67efe91ab1bf966daf67d32d4d7e8f666051790faf0f61c42547db2cd7bbc1c86bef2df55b20ad26b4fcbb9de62997d86425f167c9392354aaf6289399a8a8cddca5291c374f938a749631963ce6691a74531eaf629868e0bbf63bacb7ca8af01322b3c7fb61b8f85a61321f19945f21a4d99475071feb66726a880b9f7f6ef4e9f37e26abf454ae311", 0xf8}, {&(0x7f0000005300)="eea4df21ef5bb7d4f0a80811822234f9c39331a9a2db0d51ddf73ba0eb91a40bd597ed2c4fb018eae520def537b0596b93f9a25b54249803e94942df0b6b0fdf2cb9c99b9d245da85ac72614f3b418725c2be143e0bd7f114ade1691e2bd18a976f3b64db5db792a6a27ea5614fef7b1387a57166486a75375dbc2913ce3e7adc6e77b4e157372970c53103e73ee99e1", 0x90}], 0x3, &(0x7f0000005400)=[{0x90, 0x1bd, 0x5a, "073c0dcd0449891899e169358a2c1829b33020eef0034d05dac75ace22c1368fb77a3c9848310bea3b86c8e562741ed063d5df36d97202f3b907aaa1b8026dfd2e6d0ff3a66fa097a1dd9370d8848918c1c9b58e34579dd710c57cc7ae28c9e6f27d8c0b383cb4a6b2d3a2adb285fc78edbbc44d52d64b24c7fa8ee5"}, {0x60, 0x13d, 0x2f, "58ed0cfc932c6071574bce4a4adab37961bc1077847046f4a46f4d4eeb61c6b497f1f5f75af0951cdb887722fe1b4111cb17705cfe3ba8e70ad55b0109f996b6c4d46dd5e8d07c7a7048f840048e4b"}, {0x50, 0x89, 0xb3, "771398d453963a410a0697bb4ddab4f1e190da7df6b2151b1cf7b1adfb1d3a8ef62bb3083d38887945d9ba28e31223bc16651239437081da58f6a292427e3f"}, {0x48, 0x11c, 0x7, "78ce43642b71c53103fbb93a5c143669ec6f30ca681e360d845c6f34bf8a84ec60ee49597a7302f1a84c4f3a1e079e0429cc0ac7e9d3"}], 0x188, 0xc8c0}, 0x9}], 0x4, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2200, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000280)) bind(r0, &(0x7f0000000040)=@llc={0x1a, 0x30e, 0x1f, 0x7fff, 0xaba, 0x5, @random="6f0b7c93a044"}, 0x80) 21:58:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x8dffffff00000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:44 executing program 1: r0 = dup(0xffffffffffffff9c) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd000000100001000a2b0c00410400000000fcff", 0x58}], 0x100000ee) 21:58:44 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0xffff000000000000}}, 0x21) 21:58:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000180)) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) r3 = accept4(r2, 0x0, &(0x7f0000000140), 0x0) recvmmsg(r3, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) 21:58:44 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x400000000000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) [ 258.252114] jfs: Unrecognized mount option "u" or missing value 21:58:44 executing program 0: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x800) [ 258.293499] jfs: Unrecognized mount option "u" or missing value 21:58:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) madvise(&(0x7f0000b45000/0x4000)=nil, 0xfffffffffffffe77, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f00000002c0)="295ee13130d7b9b1671070") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r2, 0x800}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x2c) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000001400)) 21:58:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xffffffff00000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:45 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x4000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:45 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x40000}}, 0x21) 21:58:45 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x9, r1) 21:58:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x5, {0x5, 0x2, 0x5, 0x4, 0x3, 0x4, {0x6, 0x7, 0xffffffff00000001, 0x9, 0x5, 0xff, 0x100000001, 0x5, 0x8, 0x4, 0x9, r1, r2, 0x3ff, 0x101}}}, 0x90) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4040, 0x0) ioctl$KVM_NMI(r3, 0xae9a) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)=@random={'system.', 'fd'}, &(0x7f0000000500)=""/245, 0xf5) 21:58:45 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x20000000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='keyring\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x1, 0x400000088, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) tkill(r2, 0x22) [ 259.000437] jfs: Unrecognized mount option "u" or missing value 21:58:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x20400) ioctl$TUNSETLINK(r0, 0x400454cd, 0x33f) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440), 0xfffffffffffffe6c) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000300)=0x8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x1) rt_sigtimedwait(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)={0x0, 0x989680}, 0x8) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000140)={0x0, 0x0, 0x4, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'syz_tun\x00'}) 21:58:45 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0xffff0000}}, 0x21) 21:58:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xeffdffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:45 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xa000000, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a120000000000000000000200000000000000000c00000000000000000000000200010000000000000000fd00000000050005009cb9a23456a5b0b6000000000a00000000000000ff01000000000000000000000000ff000000000000000000"], 0x70}, 0x1}, 0x0) [ 259.064584] jfs: Unrecognized mount option "u" or missing value 21:58:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a66738c", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = gettid() socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) fcntl$setsig(r2, 0xa, 0x12) fcntl$setownex(r2, 0xf, &(0x7f00000ff000)={0x0, r1}) shutdown(r3, 0x1) 21:58:45 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0xf2ffffff, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x208000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x9, 0xfffffffffffffff7, 0x9, 0x9, 0x0, 0x3, 0xb08, 0xd, 0x2, 0x2, 0x4, 0x72df, 0x0, 0x1, 0x1, 0x8, 0x8, 0x3cec2dfc, 0x6, 0xfc7, 0x0, 0x5, 0xffffffff, 0xfffffffffffffffb, 0x1f, 0xffffffffffffffc0, 0x1, 0x10001, 0x3ff, 0x10000, 0x3, 0x4, 0x9, 0x5, 0x9, 0x9, 0x0, 0x6, 0x2, @perf_config_ext={0x5, 0x7fffffff}, 0x8, 0x0, 0x2, 0x0, 0x0, 0x9, 0xfffffffffffffff9}, r1, 0xe, r0, 0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c74657200000000000000010007000021a47c1200000000d3c31868d3ca40c1ed9b02ff757b255d3ca8ef93146e086017d7ff237e81b0310400a8f714"], &(0x7f00000001c0)=0x24) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x0, 0xffff, @dev={0xfe, 0x80}}], 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000300)=0x10) setsockopt$inet_buf(r4, 0x0, 0x60, &(0x7f00000000c0), 0x0) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) 21:58:45 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x4}}, 0x21) 21:58:45 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xd, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:45 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x0, "", 0x4000000000000}}, 0x21) 21:58:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)={0x303, 0x33}, 0xfffffffffffffff6) sendmsg$netlink(r0, &(0x7f0000007940)={&(0x7f0000000240)=@kern={0x10}, 0xc, &(0x7f00000077c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000000000001a0100000100000046a6a3d8e409da1095d596"], 0x10}, 0x0) 21:58:46 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0xaaaaaaaaaaaad89, &(0x7f00000003c0)=[{&(0x7f0000000040)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfffffffffffffcc0}], 0xffffffffffffffff, &(0x7f0000000080)=ANY=[]) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) ioctl$KVM_GET_REGS(r0, 0x80047210, &(0x7f0000001540)) 21:58:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xffffff8d, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:46 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe80, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:46 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x0, "", 0xffff000000000000}}, 0x21) 21:58:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000001200)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x6100, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x1000, "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"}, &(0x7f0000001140)=0x1008) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001180)={r2, 0x7}, &(0x7f00000011c0)=0x8) ioctl$BLKPG(r0, 0x1278, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)}) 21:58:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x48, &(0x7f0000000180)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@multicast1=0xe0000001}}, {{@in=@rand_addr}, 0x0, @in=@loopback=0x7f000001}}, 0xe8) 21:58:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2cd1127002eb9a7516ec162870726f6f746d6f64653d3030303030303030303030303030303034303030302c757365725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="a06c13a81f0e6e9d4a"]) stat(&(0x7f00000000c0)='\x00', &(0x7f0000000180)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x4000, 0x0) fchmodat(r1, &(0x7f0000000280)='./file0\x00', 0x8a) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) socketpair(0xd, 0xb, 0x6, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000140)={0x6, 0x4}) 21:58:46 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-camellia-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe000225070097c11ed4c2c4dc42ffa86eb9", 0x30) write$binfmt_script(r1, &(0x7f0000000480)={'#! ', './file0', [], 0xa, "ada5b76cae3e1949810895af51009bd2f120d219b4c8b554d128225db77cfe7fe018c7c465c9e9adbca6a60ca447ef4055bb56ec76d4822fff922683c967c49b7543bfd70a"}, 0x50) recvmsg(r1, &(0x7f0000000440)={&(0x7f0000000100)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/81, 0x51}], 0x1}, 0x0) [ 260.219594] jfs: Unrecognized mount option "u" or missing value [ 260.250642] jfs: Unrecognized mount option "u" or missing value 21:58:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x6500000000000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="000000e4", @ANYRES16=r1, @ANYBLOB="01070000000000000000080000000c0001000800010000000000"], 0x20}, 0x1}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1000, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000240)={0x0, 0x0, [0x4, 0x100000001, 0x6682, 0x5, 0x0, 0x2, 0x3, 0x457ccbd7]}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000080)) r3 = memfd_create(&(0x7f0000000300)='\x00', 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x200000, 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000180)) 21:58:46 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x2000008e, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:46 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x0, "", 0x40000}}, 0x21) 21:58:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x2a, 0x6, 0x0, {0x6, 0x1, 0x1, 0x0, '^'}}, 0x2a) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff], 0xbb}}, 0x14) 21:58:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030a9ab30303030303030303030303034303030302c757365725f69643de4975b9188968d9e7be2a87f6a6d13b49df1a6a38d24574e0ee0314c60b34a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) r1 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x19}, 0xffffffffffffff5b}}, 0x1, 0x8}, &(0x7f00000005c0)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000600)={r2, 0x3ff, 0x30}, 0xc) 21:58:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:46 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x2000048e, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0xf0ffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:46 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, &(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, &(0x7f00000001c0)=0x80) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000000)={0x9, 0x3, 0x8, 0x4}, 0x10) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 21:58:46 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x0, "", 0xffff0000}}, 0x21) [ 260.499497] jfs: Unrecognized mount option "u" or missing value [ 260.533593] jfs: Unrecognized mount option "u" or missing value [ 260.538234] IPVS: ftp: loaded support on port[0] = 21 21:58:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x118) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x80001, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@blksize={'blksize', 0x3d, 0x1000}, 0x2c}, {@max_read={'max_read', 0x3d, 0x5}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d, 0x1200}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@max_read={'max_read', 0x3d, 0x80000001}, 0x2c}, {@max_read={'max_read', 0x3d, 0x81}, 0x2c}]}}) 21:58:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673ff", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 261.222628] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.229109] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.236424] device bridge_slave_0 entered promiscuous mode [ 261.263777] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.270177] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.277463] device bridge_slave_1 entered promiscuous mode [ 261.304057] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.333104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 261.410289] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 261.440397] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 261.560582] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 261.567918] team0: Port device team_slave_0 added [ 261.595989] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 261.603618] team0: Port device team_slave_1 added [ 261.631343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.659622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.688785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.718592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.972100] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.978622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.985301] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.991683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.865717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.953568] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 263.035311] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 263.041477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.048612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.130738] 8021q: adding VLAN 0 to HW filter on device team0 21:58:49 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x37b8955d) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f00000003c0)) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='\x00'], &(0x7f0000000200)=[&(0x7f0000000100)='procwlan1securitymime_type,md5sumcpuset-\x00', &(0x7f0000000140)='vmnet0\x00'], 0x1000) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000380)={0x0, 0x1, 0x20, &(0x7f0000000340)=0x100000001}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000240)=""/236) 21:58:49 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cfe07721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 21:58:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x65000000, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:49 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0x0, 0x0, "", 0x4}}, 0x21) 21:58:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0x4008ae48, 0x907000) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x29, 0x200, 0x813, 0x80000001, 0x6, 0x5dee, 0x673}, r4}}, 0x120) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x4402) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="000000f8010000e4c648471e1b7499e1a4db39386be2f748a39eb95f14e659aa1c8f34f90091afe8237f28119b612aa703ffddf04da0620be6"]) 21:58:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673ff", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0xffffffffffffff71) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) 21:58:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a56558", &(0x7f0000000480)=""/228}, 0x28) 21:58:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="05000000000000000d0000402500000005000000000100000000004000000000010000000000000025000aadffffffff00040000000000200a00000006"]) r3 = socket$inet6(0xa, 0x1000000000003, 0x1) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000040)=0x4) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$KVM_SET_MSRS(r2, 0x4138ae84, &(0x7f0000000080)=ANY=[]) 21:58:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0xf, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:50 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x37b8955d) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:50 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x200000e1) 21:58:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:50 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x1, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x190e) setsockopt$inet_opts(r1, 0x0, 0x21, &(0x7f0000000000), 0x3) 21:58:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f00000000c0)='ppp1posix_acl_accessð1vmnet0cgroup)\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000000), 0x100) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) ioctl(r4, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") ioctl$KDGKBLED(r3, 0xc004510e, &(0x7f000084dfff)) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x40000) 21:58:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a588a8", &(0x7f0000000480)=""/228}, 0x28) [ 263.942847] jfs: Unrecognized mount option "u" or missing value 21:58:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x2, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:50 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8000, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000040)=""/70) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x121242) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x8, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x7fffffff, 0x9, 0x0, 0x6, 0x7fffffff, 0x6, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3, @loopback={0x0, 0x1}, 0x1}}, 0xffffffff7fffffff, 0x7f, 0x7, 0x1, 0x7fff}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)={r3, 0x1000, "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"}, &(0x7f00000012c0)=0x1008) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000001300)={0x401, {{0x2, 0x4e23}}, 0x1, 0x6, [{{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e21, @broadcast=0xffffffff}}, {{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e24, @multicast2=0xe0000002}}, {{0x2, 0x4e24}}, {{0x2, 0x4e20, @broadcast=0xffffffff}}]}, 0x390) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000016c0)={[0x0, 0x400, 0x8, 0x7, 0x2, 0xae, 0x8, 0x72, 0x8, 0x87d, 0xffff, 0x101, 0xf18a, 0x8, 0x4, 0x5], 0xf000, 0x81}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001780)='/dev/loop-control\x00', 0x40, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000017c0)=0x5, 0x4) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000001800)=0x69, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001840)={r2, 0x4f}, &(0x7f0000001880)=0x8) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000018c0)={0xc0, ""/192}) openat$nullb(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/nullb0\x00', 0x4000, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000001a00)={0xa0002, 0x0, [0x9, 0x3f, 0x5, 0x6, 0xca, 0x80000001, 0x6, 0xe8]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000001a80)={r4, 0x5}, &(0x7f0000001ac0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001b00)={r4, 0xffffffff}, &(0x7f0000001b40)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001b80)=@assoc_value={r8, 0x3}, &(0x7f0000001bc0)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000001c00)=[@in={0x2, 0x4e22, @rand_addr=0x2}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9d8}], 0x2c) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000001c40)=""/157) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000001d00)={0x5, 0xffffffffffffffff, 0x6, 0x6, 0x4, 0x80000000}) pipe2$9p(&(0x7f0000001d40)={0xffffffffffffffff}, 0x531557d971a1c9e7) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001d80)) fcntl$getownex(r9, 0x10, &(0x7f0000001dc0)={0x0, 0x0}) ptrace$getregset(0x4204, r10, 0x1, &(0x7f0000001ec0)={&(0x7f0000001e00)=""/168, 0xa8}) write$P9_RVERSION(r1, &(0x7f0000001f00)={0x15, 0x65, 0xffff, 0x2, 0x8, '9P2000.L'}, 0x15) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000001f40)={r7}, &(0x7f0000001f80)=0x8) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000002000)={0x3, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e22, @rand_addr=0x3ff}, 0x0, 0xd5b6, 0x8, 0x59, 0x39, &(0x7f0000001fc0)='ip6gretap0\x00', 0x3, 0x100000001, 0x4}) 21:58:50 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x37b8955d) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") [ 264.018581] print_req_error: I/O error, dev loop0, sector 0 [ 264.024960] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 264.035485] jfs: Unrecognized mount option "u" or missing value 21:58:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a50575", &(0x7f0000000480)=""/228}, 0x28) 21:58:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:50 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0xf) [ 264.213163] jfs: Unrecognized mount option "u" or missing value [ 264.285792] jfs: Unrecognized mount option "u" or missing value 21:58:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x3, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x8}) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, {0xfffffffffffffff0, 0xffff, 0x5, 0x4, 0x1, 0x2}}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0x4008556c, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil}) close(r0) 21:58:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0xe}, 0x28) 21:58:50 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaa4043aaaaaaaaffffffffff09080045000020000000000002907800000000e0000001110090780000000000000008"], &(0x7f0000aed000)) 21:58:50 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x37b8955d) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:50 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="ee950000000000000040", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000080)={0x3, 0x101}) 21:58:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)="6a6673ff", &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:50 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xfffffffffffffffd, 0x10, 0x7, 0x2, 0x0, r0, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000000)="860cc5a6", &(0x7f0000000540)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/144}, 0x18) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000280)=0x4, 0x4) ioctl$TIOCSTI(r2, 0x5412, 0x7) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000080)={0x4, 0x9, 0xd6f, 0x4}) 21:58:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0x4}, 0x28) 21:58:50 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b1787526fbf2bfe87f9193ab05") 21:58:50 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3, 0x0, {0x0, 0xc9}}, 0x21) 21:58:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x4, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:50 executing program 0: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000000940)='sysfs\x00', 0x0, &(0x7f000000a000)) capset(&(0x7f00000008c0)={0x19980330}, &(0x7f0000000900)) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/100, 0xc9755803925630df) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000100)=""/140, &(0x7f00000001c0)=0x8c) 21:58:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:51 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0x4448, &(0x7f0000000080)=0x2) chmod(&(0x7f0000000140)='./file0\x00', 0x20) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) write$P9_RSTAT(r0, &(0x7f0000000180)={0x5e, 0x7d, 0x1, {0x0, 0x57, 0x10001, 0x0, {0x0, 0x4, 0x3}, 0x40000, 0xb, 0x1, 0x100000000, 0x7, 'keyring', 0x1c, 'eth0selinux(&usertrustedbdev', 0x1, ')'}}, 0x5e) 21:58:51 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0x100000000000000}, 0x28) 21:58:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1500, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:51 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) restart_syscall() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:51 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000e5000)='/dev/snd/controlC#\x00', 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x100, 0x101001) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85513, &(0x7f0000dbeb38)={{0x8, 0x0, 0x0, 0x0, "8aa5de29dbf9e1b017749134f893ee0a212b2934ac491fc6e59344c4d0190079fbb33091ff02108a551cce53"}, 0x0, [0x100000000000000], {0x77359400}}) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) finit_module(r0, &(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1) 21:58:51 executing program 4: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)="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") [ 264.930422] jfs: Unrecognized mount option "u" or missing value 21:58:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) r4 = dup2(r0, r2) statx(r4, &(0x7f0000000080)='./file0\x00', 0xc00, 0x7ff, &(0x7f0000000240)) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0200000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x485, 0x5]}) [ 265.007060] jfs: Unrecognized mount option "u" or missing value 21:58:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, r0, 0x8, 0x3}, 0x14) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="c847846b17f18cb0b32bb5c810591b66643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0xff6e) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000200000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000091f659c8bb79dfaa5d9dedfa1eeb9718c5b8ff867f515b2c30532e36260bb94e6d9afa508036d09559319959bcb5cb4858c7a7b2b7cd18ce9b68612567b6db2c0ded9635374eb2c328096cda66dba383c0550f83c356de8dd103cd6aa2462f243d82b93e1519fa00e8992aeed7d8eb67a4817b7e29635916873cdc74bbe32f31bb671e0eb8386c70"], 0x118) 21:58:51 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0x80ffffff00000000}, 0x28) 21:58:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0xf0ffffff, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:51 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:51 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) uname(&(0x7f0000000000)=""/55) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r1 = socket(0x19, 0x1, 0x2bacede6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) 21:58:51 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x10002) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000100)=0x19e4) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xe800, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="eb3c906d6b660800666174000204010a0200027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f0000000240)={[{@fat=@codepage={'codepage', 0x3d, '737'}, 0x2c}]}) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000140)=""/19) 21:58:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x103d}, 0x2c) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$getown(r0, 0x9) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x5, {{0x1, 0xb08, 0x2, r2}}}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) accept(r0, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) [ 265.706984] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.727900] jfs: Unrecognized mount option "u" or missing value 21:58:52 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:52 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0x2000000}, 0x28) 21:58:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x6500, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:52 executing program 1: r0 = accept(0xffffffffffffff9c, &(0x7f0000000140)=@can, &(0x7f00000001c0)=0x80) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), &(0x7f00000002c0)=0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)=""/109, &(0x7f0000000100)=0x6d) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) kexec_load(0x1, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="845723b7", 0x4, 0x4}], 0x160000) clock_getres(0x0, &(0x7f0000000240)) 21:58:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) [ 265.817892] jfs: Unrecognized mount option "u" or missing value 21:58:52 executing program 0: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000332000)=',mime_typebdev(\x00', 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") io_submit(r1, 0x0, &(0x7f0000000240)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ptrace$cont(0x29, r3, 0x9, 0x1) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)=';', 0x1}]) 21:58:52 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:52 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") [ 266.032443] jfs: Unrecognized mount option "u" or missing value 21:58:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x4000, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200000, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4080aea2, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c372ea384d3db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84fda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c20000000decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d0956fbc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b1800"}) 21:58:52 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = dup(r0) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x100000001}}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f}, 0xe) [ 266.081634] jfs: Unrecognized mount option "u" or missing value 21:58:52 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$void(r0, 0xc0045c77) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:52 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x9) setuid(r1) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(crct10dif-generic,chacha20-simd)\x00'}, 0x24) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), r3, 0x200}}, 0x18) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xa3, 0x2) clock_adjtime(0x7, &(0x7f0000000480)={0x9, 0xfffffffffffffffa, 0x2, 0x0, 0x1, 0xfff, 0x8f, 0x1000, 0x9666, 0x5, 0x1f, 0x100000001, 0x3, 0x80000001, 0x10001, 0x0, 0x2, 0x100, 0x3f, 0x35c, 0x100000000, 0x3, 0x1, 0x3b, 0x2, 0x1ff}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f00000003c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x1, {0xa, 0x4e20, 0x81, @local={0xfe, 0x80, [], 0xaa}, 0x4}, r3}}, 0x38) accept4$inet6(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x80000) 21:58:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x65, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 266.270853] jfs: Unrecognized mount option "u" or missing value [ 266.333498] jfs: Unrecognized mount option "u" or missing value 21:58:53 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0xc0ffffff}, 0x28) 21:58:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) ioctl$fiemap(r0, 0xc020660b, &(0x7f00000002c0)={0x4, 0xba, 0x7, 0xd06, 0x8, [{0x7, 0x3, 0x8, 0x0, 0x0, 0x2000}, {0x8, 0x7, 0x1, 0x0, 0x0, 0x1400}, {0x9, 0x5, 0xbe, 0x0, 0x0, 0x100}, {0x9, 0x926, 0x2, 0x0, 0x0, 0x800}, {0x5485, 0x8000, 0x6, 0x0, 0x0, 0x808}, {0x4, 0x5, 0x1f, 0x0, 0x0, 0x2080}, {0x800, 0x8, 0x8, 0x0, 0x0, 0x1000}, {0x1000, 0x100, 0x10001, 0x0, 0x0, 0x4}]}) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x251) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendto$inet(r0, &(0x7f000099bf26), 0x143, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffe4a, 0x840, 0x0, 0x0) 21:58:53 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = getgid() getuid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='fuse\x00', 0x20000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r1}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0xfffffffffffffff7, 0x5}, {0x0, 0x5}, 0x1, 0x1, 0x5}) 21:58:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000210000)=0x2, 0x4) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10800) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x898, 0x0, 0x0, 0x2e8, 0x2e8, 0x0, 0x7c8, 0x7c8, 0x7c8, 0x7c8, 0x7c8, 0x6, &(0x7f0000000080), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x6}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@inet=@l2tp={0x30, 'l2tp\x00', 0x0, {0x2, 0x3, 0x3, 0x1, 0x1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x89, 0xbd, 0x1ff, 0x42da63fa, 0xeed, @remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @dev={0xfe, 0x80, [], 0xc}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xffffff00, 0xffffff00, 0x0, 0xffffffff], [0xffffff00, 0xff000000, 0xff000000], 0x100, 0x400}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@loopback=0x7f000001, 0x15, 0x23, 0x200}}}, {{@uncond, 0x0, 0x138, 0x180, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0xfffffffffffffffb, 0x1, 0x1, [0x6, 0x0, 0x3, 0x3, 0x0, 0x4, 0x5, 0x1, 0x125, 0x100000001, 0x101, 0x500000000, 0x0, 0x8, 0xe8, 0x97]}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@dev={0xac, 0x14, 0x14, 0x15}, @ipv4=@multicast1=0xe0000001, 0x30, 0x1a, 0x670}}}, {{@ipv6={@loopback={0x0, 0x1}, @empty, [0xffffffff, 0xff, 0xff000000, 0xff], [0xff000000, 0xff, 0xff, 0xff], 'rose0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x0, 0x8000, 0x4}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4, 'ip6gretap0\x00', 0x1}}}, {{@ipv6={@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0x0, 0xffffffff], [0x0, 0x0, 0xffffffff, 0xffffffff], 'ip6_vti0\x00', 'bcsf0\x00', {}, {}, 0xbf, 0x5, 0x2, 0x1b}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x0, 0x6, 0x3, 0x3, 0x30, 0x6, [@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, @ipv4={[], [0xff, 0xff], @rand_addr=0x9}, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @empty, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xb}}, @loopback={0x0, 0x1}, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, @remote={0xfe, 0x80, [], 0xbb}, @empty, @mcast1={0xff, 0x1, [], 0x1}], 0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x8f8) 21:58:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x8dffffff, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:53 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:53 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400100, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:53 executing program 0: r0 = gettid() r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7, 0x200) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f00000001c0)=0x874, 0x4) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mremap(&(0x7f0000356000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000536000/0x1000)=nil) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) mremap(&(0x7f000044e000/0x10000)=nil, 0x10000, 0x1000, 0x3, &(0x7f000088b000/0x1000)=nil) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000200)={'bond_slave_1\x00', {0x2, 0x4e23, @broadcast=0xffffffff}}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') [ 267.017368] jfs: Unrecognized mount option "u" or missing value [ 267.025186] protocol 4a75 is buggy, dev gre0 [ 267.039713] protocol 4a75 is buggy, dev gre0 [ 267.054134] protocol 4a75 is buggy, dev gre0 21:58:53 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)="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") 21:58:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0xe108e02, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 267.086907] jfs: Unrecognized mount option "u" or missing value 21:58:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000000)="747c9a5b4b3793", 0x7) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa}, 0x1c) close(r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) close(r1) 21:58:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:53 executing program 4 (fault-call:1 fault-nth:0): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:53 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = memfd_create(&(0x7f0000000140)='$\x00', 0x2) accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000240)=0x60) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6b, 0x20000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x7fff, 0x40000, 0x9, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}) [ 267.294475] FAULT_INJECTION: forcing a failure. [ 267.294475] name failslab, interval 1, probability 0, space 0, times 0 [ 267.306160] CPU: 1 PID: 14989 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 267.313545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.322920] Call Trace: [ 267.325528] dump_stack+0x1c9/0x2b4 [ 267.329192] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.334411] ? alloc_set_pte+0x1027/0x1620 [ 267.338684] should_fail.cold.4+0xa/0x1a [ 267.342770] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.347893] ? lock_downgrade+0x8f0/0x8f0 [ 267.352054] ? unlock_page+0x1d1/0x2c0 [ 267.355956] ? graph_lock+0x170/0x170 [ 267.359783] ? find_held_lock+0x36/0x1c0 [ 267.363856] ? __lock_is_held+0xb5/0x140 [ 267.368132] ? check_same_owner+0x340/0x340 [ 267.372469] ? perf_event_ctx_lock_nested+0x28e/0x500 [ 267.377675] ? rcu_note_context_switch+0x730/0x730 [ 267.382624] __should_failslab+0x124/0x180 [ 267.386875] should_failslab+0x9/0x14 [ 267.390690] __kmalloc_track_caller+0x2c4/0x760 [ 267.395370] ? strncpy_from_user+0x510/0x510 [ 267.399788] ? strndup_user+0x77/0xd0 [ 267.403606] memdup_user+0x2c/0xa0 [ 267.407159] strndup_user+0x77/0xd0 [ 267.410803] perf_event_set_filter+0xbe/0x1260 [ 267.415398] ? mutex_trylock+0x2b0/0x2b0 [ 267.419473] ? graph_lock+0x170/0x170 [ 267.423287] ? lock_acquire+0x1e4/0x540 [ 267.427273] ? perf_trace_lock+0xde/0x920 [ 267.431433] ? perf_pmu_unregister+0x540/0x540 [ 267.436030] ? zap_class+0x740/0x740 [ 267.439755] ? find_held_lock+0x36/0x1c0 [ 267.443824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.449376] ? zap_class+0x740/0x740 [ 267.453104] ? graph_lock+0x170/0x170 [ 267.456917] ? _parse_integer+0x190/0x190 [ 267.461078] ? graph_lock+0x170/0x170 [ 267.464887] ? zap_class+0x740/0x740 [ 267.468621] _perf_ioctl+0x865/0x1600 [ 267.472448] ? __do_sys_perf_event_open+0x30f0/0x30f0 [ 267.477657] ? lock_downgrade+0x8f0/0x8f0 [ 267.481814] ? rcu_is_watching+0x8c/0x150 [ 267.485976] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 267.490399] ? mutex_lock_nested+0x16/0x20 [ 267.494634] ? mutex_lock_nested+0x16/0x20 [ 267.498887] ? perf_event_ctx_lock_nested+0x415/0x500 [ 267.504088] ? perf_event_read_event+0x450/0x450 [ 267.508854] ? match_held_lock+0x821/0x8d0 [ 267.513096] ? expand_files.part.8+0x9c0/0x9c0 [ 267.517690] ? kasan_check_write+0x14/0x20 [ 267.521930] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 267.526896] perf_ioctl+0x59/0x80 [ 267.530360] ? _perf_ioctl+0x1600/0x1600 [ 267.534425] do_vfs_ioctl+0x1de/0x1720 [ 267.538324] ? ioctl_preallocate+0x300/0x300 [ 267.542827] ? __fget_light+0x2f7/0x440 [ 267.546807] ? fget_raw+0x20/0x20 [ 267.550291] ? __sb_end_write+0xac/0xe0 [ 267.554275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.559824] ? fput+0x130/0x1a0 [ 267.563112] ? ksys_write+0x1ae/0x260 [ 267.566944] ? security_file_ioctl+0x94/0xc0 [ 267.571394] ksys_ioctl+0xa9/0xd0 [ 267.574949] __x64_sys_ioctl+0x73/0xb0 [ 267.578857] do_syscall_64+0x1b9/0x820 [ 267.582747] ? finish_task_switch+0x1d3/0x870 [ 267.587336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.592272] ? syscall_return_slowpath+0x31d/0x5e0 [ 267.597210] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 267.602581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.607439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.612651] RIP: 0033:0x455a79 [ 267.615835] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.635273] RSP: 002b:00007fcbef4d3c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.643000] RAX: ffffffffffffffda RBX: 00007fcbef4d46d4 RCX: 0000000000455a79 [ 267.650278] RDX: 0000000020000000 RSI: 0000000040082406 RDI: 0000000000000013 [ 267.657552] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 267.665519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 267.672802] R13: 00000000004c5508 R14: 00000000004ccca8 R15: 0000000000000000 [ 267.732641] jfs: Unrecognized mount option "u" or missing value 21:58:54 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0xa}, 0x28) 21:58:54 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x49) r3 = socket$inet_dccp(0x2, 0x6, 0x0) kcmp(r0, r1, 0x4, r2, r3) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0xfffffffffffffcf3) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) 21:58:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0xe108e0200000000, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 267.788756] jfs: Unrecognized mount option "u" or missing value 21:58:54 executing program 4 (fault-call:1 fault-nth:1): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b1787526fbf2bfe87f9193ab05") 21:58:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000000)) socketpair(0x3, 0xe, 0x7, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, {0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x14}}, 0x2, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ipddp0\x00'}) 21:58:54 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 21:58:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x8dffffff00000000, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) 21:58:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0xd4f24923a1a6d720) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x118) 21:58:54 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0xa00) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000600)={@mcast1, 0x0}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={'nr0\x00', r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x16, [@typed={0x3, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 21:58:54 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0xf2ffffff00000000}, 0x28) [ 268.202214] FAULT_INJECTION: forcing a failure. [ 268.202214] name failslab, interval 1, probability 0, space 0, times 0 [ 268.213942] CPU: 1 PID: 15033 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 268.221324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.230950] Call Trace: [ 268.233563] dump_stack+0x1c9/0x2b4 [ 268.237230] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.242447] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 268.247313] ? rcu_note_context_switch+0x730/0x730 [ 268.252288] should_fail.cold.4+0xa/0x1a [ 268.256375] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.261604] ? graph_lock+0x170/0x170 [ 268.265424] ? mutex_trylock+0x2b0/0x2b0 [ 268.269505] ? unwind_get_return_address+0x61/0xa0 [ 268.274459] ? find_held_lock+0x36/0x1c0 [ 268.278545] ? __lock_is_held+0xb5/0x140 [ 268.282655] ? check_same_owner+0x340/0x340 [ 268.287008] ? rcu_note_context_switch+0x730/0x730 [ 268.292003] __should_failslab+0x124/0x180 [ 268.296698] should_failslab+0x9/0x14 21:58:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000100027400f8", 0x16}], 0x1, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}], 0x10) renameat(r0, &(0x7f0000000040)="2e2f636f6e74726f6cff0500", r0, &(0x7f0000000080)='./file1\x00') 21:58:54 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x2, 0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0xb00, 0x1000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x1}, &(0x7f00000002c0)=0x8) getdents(r0, &(0x7f0000000140)=""/2, 0x450) [ 268.300521] kmem_cache_alloc_trace+0x2cb/0x780 [ 268.305228] create_filter_start+0xca/0x2e0 [ 268.309604] create_filter+0xe7/0x2e0 [ 268.311838] jfs: Unrecognized mount option "u" or missing value [ 268.313422] ? process_preds+0x4220/0x4220 [ 268.313475] ftrace_profile_set_filter+0x135/0x2f0 [ 268.328778] ? ftrace_profile_free_filter+0x70/0x70 [ 268.333848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.339386] ? memdup_user+0x6b/0xa0 [ 268.343541] perf_event_set_filter+0x251/0x1260 [ 268.348211] ? mutex_trylock+0x2b0/0x2b0 [ 268.352446] ? graph_lock+0x170/0x170 [ 268.356235] ? lock_acquire+0x1e4/0x540 [ 268.360198] ? perf_trace_lock+0xde/0x920 [ 268.364431] ? perf_pmu_unregister+0x540/0x540 [ 268.369003] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 268.373855] ? zap_class+0x740/0x740 [ 268.377562] ? perf_trace_lock+0x920/0x920 [ 268.381792] ? zap_class+0x740/0x740 [ 268.385500] ? graph_lock+0x170/0x170 [ 268.389379] ? _parse_integer+0x190/0x190 [ 268.393529] ? graph_lock+0x170/0x170 [ 268.397332] ? zap_class+0x740/0x740 [ 268.401055] _perf_ioctl+0x865/0x1600 [ 268.404935] ? __do_sys_perf_event_open+0x30f0/0x30f0 [ 268.410120] ? lock_downgrade+0x8f0/0x8f0 [ 268.414273] ? rcu_is_watching+0x8c/0x150 [ 268.418415] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 268.422817] ? mutex_lock_nested+0x16/0x20 [ 268.427042] ? mutex_lock_nested+0x16/0x20 [ 268.431269] ? perf_event_ctx_lock_nested+0x415/0x500 [ 268.436485] ? perf_event_read_event+0x450/0x450 [ 268.441250] ? match_held_lock+0x821/0x8d0 [ 268.445500] ? expand_files.part.8+0x9c0/0x9c0 [ 268.450074] ? kasan_check_write+0x14/0x20 [ 268.454301] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 268.459231] perf_ioctl+0x59/0x80 [ 268.462687] ? _perf_ioctl+0x1600/0x1600 [ 268.466737] do_vfs_ioctl+0x1de/0x1720 [ 268.470627] ? ioctl_preallocate+0x300/0x300 [ 268.475041] ? __fget_light+0x2f7/0x440 [ 268.479007] ? fget_raw+0x20/0x20 [ 268.482468] ? __sb_end_write+0xac/0xe0 [ 268.486437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.491973] ? fput+0x130/0x1a0 [ 268.495243] ? ksys_write+0x1ae/0x260 [ 268.499039] ? security_file_ioctl+0x94/0xc0 [ 268.503440] ksys_ioctl+0xa9/0xd0 [ 268.506885] __x64_sys_ioctl+0x73/0xb0 [ 268.510771] do_syscall_64+0x1b9/0x820 [ 268.514646] ? syscall_slow_exit_work+0x500/0x500 [ 268.519489] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.524418] ? syscall_return_slowpath+0x31d/0x5e0 [ 268.529401] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 268.534766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.539626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.544808] RIP: 0033:0x455a79 [ 268.547984] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.568996] RSP: 002b:00007fcbef4d3c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.576719] RAX: ffffffffffffffda RBX: 00007fcbef4d46d4 RCX: 0000000000455a79 [ 268.586491] RDX: 0000000020000000 RSI: 0000000040082406 RDI: 0000000000000013 [ 268.593815] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 21:58:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x20000000000000, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) [ 268.601253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 268.608600] R13: 00000000004c5508 R14: 00000000004ccca8 R15: 0000000000000001 21:58:54 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228, 0x80ffffff}, 0x28) 21:58:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x28440, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000001280)={&(0x7f0000001200)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80}}]}, 0x2c}, 0x1}, 0x0) [ 268.694079] jfs: Unrecognized mount option "u" or missing value 21:58:55 executing program 6: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0xfffffffffffffffa, @loopback={0x0, 0x1}, 0x7fffffff}}, 0x3ff, 0xfff}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000380)={r1, 0x8, 0x6, 0xffff, 0x3c1, 0x5}, &(0x7f00000003c0)=0x14) r2 = request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="9f00", 0x0) keyctl$update(0x2, r2, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f0000000280)='127.0.0.1\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)='9p\x00', 0x2880000, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x7}, 0x2c}, {@rq={'rq', 0x3d}, 0x2c}, {@sq={'sq', 0x3d, 0xfffffffffffffffa}, 0x2c}, {@common=@debug={'debug', 0x3d, 0x8}, 0x2c}, {@rq={'rq', 0x3d, 0x3}, 0x2c}, {@timeout={'timeout', 0x3d, 0x2}, 0x2c}]}}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="21000000030000000000000000000000000000000000000002000000000000000061f700554f9d4864115116e714eaf716b61deac3d4f7841d5b6cfa349678eea5432c0b59c0c4457593f9f4a5433d160c14f4c77ddefb344d17698684528389a81a97adba6be598abbd6674826a6cc86e22be53d6f592ef5a53593dfec7a75b6a59b0cb217c50ff77b0355cdd89d484206afc5931103c1c8628e1c673beae3e1dec7659134903f2847648c68081fbadf43f456fb392180aeb6103595ed92992f5a2369726a63011d58286e9b95bfec13c512e22ffe55a13fae34c8b"], 0x21) socket$bt_rfcomm(0x1f, 0x3, 0x3) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x200000) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000040)=0x6, 0x4) 21:58:55 executing program 0: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/18, 0x12}], 0x1, &(0x7f0000000380)=""/177, 0xb1, 0x7ff}, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000440)={0x0, 0x76, "4d017c486c76691eba33500b7f43f646bacb30d3dbb5eec36f434718e7a3c3791dc0fa414b93e185eb910ead0d93c8a528d454e22f4bdb8755388bd2ab172dd17ec5840646efd33e5104c15e5212f2c0031b3a6262031ed9e7dc0a15c14baa0f784a5b62b009d23b8b6a5cfdcaf15609392c5d8bb901"}, &(0x7f00000004c0)=0x7e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={r1, 0x1000, "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"}, &(0x7f0000001540)=0x1008) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000100)='/vmnet0\x00', 0x11f, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file1\x00', 0x0) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)='./file0\x00') 21:58:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0xffffffff00000000, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:55 executing program 4 (fault-call:1 fault-nth:2): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)="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") 21:58:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$jfs(&(0x7f0000000180)='jfs\a', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2c}], 0x975}) [ 268.885455] FAULT_INJECTION: forcing a failure. [ 268.885455] name failslab, interval 1, probability 0, space 0, times 0 [ 268.896987] CPU: 0 PID: 15081 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 268.904382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.913751] Call Trace: [ 268.916350] dump_stack+0x1c9/0x2b4 [ 268.919991] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.925373] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 268.930315] should_fail.cold.4+0xa/0x1a [ 268.934382] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.939506] ? save_stack+0x43/0xd0 [ 268.943142] ? kmem_cache_alloc_trace+0x152/0x780 [ 268.947978] ? create_filter_start+0xca/0x2e0 [ 268.952543] ? create_filter+0xe7/0x2e0 [ 268.956527] ? ftrace_profile_set_filter+0x135/0x2f0 [ 268.961627] ? graph_lock+0x170/0x170 [ 268.965524] ? ksys_ioctl+0xa9/0xd0 [ 268.969154] ? __x64_sys_ioctl+0x73/0xb0 [ 268.973232] ? do_syscall_64+0x1b9/0x820 [ 268.977296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.982757] ? find_held_lock+0x36/0x1c0 [ 268.986825] ? __lock_is_held+0xb5/0x140 [ 268.990898] ? check_same_owner+0x340/0x340 [ 268.995221] ? rcu_note_context_switch+0x730/0x730 [ 269.000159] __should_failslab+0x124/0x180 [ 269.004394] should_failslab+0x9/0x14 [ 269.008186] kmem_cache_alloc_trace+0x2cb/0x780 [ 269.012872] create_filter_start+0x122/0x2e0 [ 269.017284] create_filter+0xe7/0x2e0 [ 269.021088] ? process_preds+0x4220/0x4220 [ 269.025337] ftrace_profile_set_filter+0x135/0x2f0 [ 269.030284] ? ftrace_profile_free_filter+0x70/0x70 [ 269.035310] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.040859] ? memdup_user+0x6b/0xa0 [ 269.044584] perf_event_set_filter+0x251/0x1260 [ 269.049334] ? mutex_trylock+0x2b0/0x2b0 [ 269.053390] ? memset+0x31/0x40 [ 269.056669] ? perf_pmu_unregister+0x540/0x540 [ 269.061254] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 269.066093] ? zap_class+0x740/0x740 [ 269.069800] ? perf_trace_lock+0x920/0x920 [ 269.074043] ? zap_class+0x740/0x740 [ 269.077842] ? graph_lock+0x170/0x170 [ 269.081635] ? perf_trace_run_bpf_submit+0x270/0x3b0 [ 269.086745] ? graph_lock+0x170/0x170 [ 269.090544] ? zap_class+0x740/0x740 [ 269.094264] _perf_ioctl+0x865/0x1600 [ 269.098058] ? __do_sys_perf_event_open+0x30f0/0x30f0 [ 269.103353] ? lock_downgrade+0x8f0/0x8f0 [ 269.107504] ? rcu_is_watching+0x8c/0x150 [ 269.111657] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 269.118419] ? mutex_lock_nested+0x16/0x20 [ 269.122645] ? mutex_lock_nested+0x16/0x20 [ 269.126869] ? perf_event_ctx_lock_nested+0x415/0x500 [ 269.132058] ? perf_event_read_event+0x450/0x450 [ 269.136812] ? match_held_lock+0x821/0x8d0 [ 269.141043] ? expand_files.part.8+0x9c0/0x9c0 [ 269.145636] ? kasan_check_write+0x14/0x20 [ 269.149860] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 269.154879] perf_ioctl+0x59/0x80 [ 269.158327] ? _perf_ioctl+0x1600/0x1600 [ 269.162386] do_vfs_ioctl+0x1de/0x1720 [ 269.166274] ? ioctl_preallocate+0x300/0x300 [ 269.170674] ? __fget_light+0x2f7/0x440 [ 269.174642] ? fget_raw+0x20/0x20 [ 269.178105] ? __sb_end_write+0xac/0xe0 [ 269.182078] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.187616] ? fput+0x130/0x1a0 [ 269.190889] ? ksys_write+0x1ae/0x260 [ 269.194697] ? security_file_ioctl+0x94/0xc0 [ 269.199103] ksys_ioctl+0xa9/0xd0 [ 269.202552] __x64_sys_ioctl+0x73/0xb0 [ 269.206436] do_syscall_64+0x1b9/0x820 [ 269.210314] ? syscall_slow_exit_work+0x500/0x500 [ 269.215161] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.220089] ? syscall_return_slowpath+0x31d/0x5e0 [ 269.225027] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 269.230402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.235247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.240428] RIP: 0033:0x455a79 [ 269.243606] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.263087] RSP: 002b:00007fcbef4d3c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.270799] RAX: ffffffffffffffda RBX: 00007fcbef4d46d4 RCX: 0000000000455a79 [ 269.278058] RDX: 0000000020000000 RSI: 0000000040082406 RDI: 0000000000000013 21:58:55 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) r1 = accept4(r0, &(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x40, 0xf034, 0x40, 0x4df, 0xfffffffffffff800}, &(0x7f0000000140)=0x14) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0xffffffffffffff80, 0x4, 0x6, 0x1}) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000200)={r2, 0x9, 0x40}, 0x8) [ 269.285329] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 269.292598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 269.299882] R13: 00000000004c5508 R14: 00000000004ccca8 R15: 0000000000000002 21:58:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100)=0x3d3cf8772076e93b, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$alg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvfrom(r2, &(0x7f0000000240)=""/101, 0x65, 0x0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x6500000000000000, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x70115a) 21:58:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x40000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'veth1_to_team\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000740)={&(0x7f0000000180)={0x1d, r2}, 0x6, &(0x7f0000000040)={&(0x7f00000001c0)=@canfd={{0x1, 0x1000, 0xccc4, 0xe7}, 0x23, 0x2, 0x0, 0x0, "85ce1fd02346ba02e796f31f257a58e1fd8dd2856c4585f2d7ca4476838533aaf12a0425f786bab5784dcac0acee8e8dafdf1dbf43eb3374e44af3cdfbee72c9"}, 0x10}, 0x1}, 0x800) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x4b, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 269.563336] ------------[ cut here ]------------ [ 269.568136] kernel BUG at net/ipv4/ip_output.c:773! [ 269.573470] invalid opcode: 0000 [#1] SMP KASAN [ 269.578166] CPU: 0 PID: 15085 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 269.585523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.594889] RIP: 0010:ip_do_fragment+0x2468/0x2ae0 [ 269.599809] Code: 8b 8d 70 fe ff ff e9 67 e8 ff ff 4c 89 ef e8 df 7a 57 fb e9 49 e9 ff ff 4c 89 f7 e8 d2 7a 57 fb e9 c1 e5 ff ff e8 b8 a0 19 fb <0f> 0b 4c 89 e7 e8 be 7a 57 fb e9 85 e8 ff ff 4c 89 f7 89 8d 70 fe [ 269.619294] RSP: 0018:ffff880195016880 EFLAGS: 00010246 [ 269.624653] RAX: 0000000000040000 RBX: ffff8801ce7be940 RCX: ffffc90002a12000 [ 269.631913] RDX: 0000000000040000 RSI: ffffffff86626ae8 RDI: 0000000000000005 [ 269.639177] RBP: ffff880195016a58 R08: ffff8801c66e8180 R09: ffffed00323180ba [ 269.646452] R10: ffffed00323180bc R11: ffff8801918c05e3 R12: ffff8801ce7bea04 [ 269.653717] R13: 00000000fffffff2 R14: ffff8801ce7bea10 R15: dffffc0000000000 [ 269.660988] FS: 00007effc88a9700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 269.669213] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.675079] CR2: 00007ffdeada9000 CR3: 00000001b3b5d000 CR4: 00000000001406f0 [ 269.682343] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 269.689698] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 269.696954] Call Trace: [ 269.699529] ? trace_hardirqs_on+0xd/0x10 [ 269.703668] ? ip_copy_metadata+0xac0/0xac0 [ 269.707977] ? ip_finish_output2+0x1860/0x1860 [ 269.712549] ? graph_lock+0x170/0x170 [ 269.716338] ? graph_lock+0x170/0x170 [ 269.720130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.725665] ? ipv4_mtu+0x37d/0x590 [ 269.729283] ? __build_flow_key.constprop.53+0x5f0/0x5f0 [ 269.734720] ? find_held_lock+0x36/0x1c0 [ 269.738773] ip_fragment.constprop.49+0x179/0x240 [ 269.743601] ip_finish_output+0x6e4/0xfa0 [ 269.747732] ? ip_fragment.constprop.49+0x240/0x240 [ 269.752787] ? kasan_check_read+0x11/0x20 [ 269.756916] ? rcu_is_watching+0x8c/0x150 [ 269.761115] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 269.765518] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 269.770519] ? nf_hook_slow+0x11e/0x1c0 [ 269.774476] ip_output+0x223/0x880 [ 269.777999] ? __ip_local_out+0x5e3/0xb50 [ 269.782135] ? ip_mc_output+0x15d0/0x15d0 [ 269.786262] ? rcu_is_watching+0x8c/0x150 [ 269.790398] ? ip_fragment.constprop.49+0x240/0x240 [ 269.795403] ? __bpf_redirect+0x5b7/0xae0 [ 269.799539] ? __ip_select_ident+0x170/0x2a0 [ 269.803941] ? ip_idents_reserve+0x310/0x310 [ 269.808332] ip_local_out+0xc5/0x1b0 [ 269.812031] iptunnel_xmit+0x567/0x850 [ 269.815914] ip_tunnel_xmit+0x1598/0x3af1 [ 269.820053] ? quarantine_put+0x10d/0x1b0 [ 269.824185] ? ip_md_tunnel_xmit+0x1670/0x1670 [ 269.828750] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 269.834274] ? kasan_check_write+0x14/0x20 [ 269.838492] ? pskb_expand_head+0x6b2/0x10e0 [ 269.842882] ? print_usage_bug+0xc0/0xc0 [ 269.846930] ? retint_kernel+0x10/0x10 [ 269.850803] ? __pskb_copy_fclone+0xea0/0xea0 [ 269.855293] ? graph_lock+0x170/0x170 [ 269.859079] ? trace_hardirqs_on+0x10/0x10 [ 269.863306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.868826] __gre_xmit+0x5e1/0x980 [ 269.872476] ipgre_xmit+0x3e8/0xb50 [ 269.876087] ? gre_tap_xmit+0x590/0x590 [ 269.880047] ? __lock_is_held+0xb5/0x140 [ 269.884108] dev_hard_start_xmit+0x26c/0xc30 [ 269.888508] ? rcu_is_watching+0x60/0x150 [ 269.892637] ? dev_direct_xmit+0x6b0/0x6b0 [ 269.896854] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.902375] ? netif_skb_features+0x690/0xb70 [ 269.906858] ? validate_xmit_xfrm+0x1ef/0xdc0 [ 269.911342] ? lock_acquire+0x1e4/0x540 [ 269.915387] ? validate_xmit_skb+0x80c/0xf30 [ 269.919778] ? netif_skb_features+0xb70/0xb70 [ 269.924778] __dev_queue_xmit+0x29ef/0x3910 [ 269.929083] ? pskb_expand_head+0x228/0x10e0 [ 269.933560] ? skb_ensure_writable+0x3dd/0x640 [ 269.938124] ? bpf_clone_redirect+0x14a/0x490 [ 269.942614] ? bpf_prog_bebbfe2050753572+0x12c/0x1000 [ 269.947798] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 269.952203] ? netdev_pick_tx+0x2d0/0x2d0 [ 269.956332] ? is_bpf_text_address+0xd7/0x170 [ 269.960813] ? kernel_text_address+0x79/0xf0 [ 269.965216] ? __lock_is_held+0xb5/0x140 [ 269.969264] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 269.974263] ? skb_release_data+0x1c4/0x880 [ 269.978580] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 269.983849] ? kasan_unpoison_shadow+0x35/0x50 [ 269.988445] ? skb_tx_error+0x2f0/0x2f0 [ 269.992404] ? kasan_kmalloc+0xc4/0xe0 [ 269.996276] ? __kmalloc_node_track_caller+0x47/0x70 [ 270.001367] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.006994] ? kasan_check_write+0x14/0x20 [ 270.011234] ? pskb_expand_head+0x6b2/0x10e0 [ 270.015716] ? graph_lock+0x170/0x170 [ 270.019502] ? __pskb_copy_fclone+0xea0/0xea0 [ 270.023988] ? memcpy+0x45/0x50 [ 270.027253] ? sock_spd_release+0x2e0/0x2e0 [ 270.031577] ? kasan_check_write+0x14/0x20 [ 270.035794] ? __skb_clone+0x6a7/0x9e0 [ 270.039671] ? __copy_skb_header+0x550/0x550 [ 270.044073] ? do_raw_spin_unlock+0xa7/0x2f0 [ 270.048476] ? skb_ensure_writable+0x15e/0x640 [ 270.053056] dev_queue_xmit+0x17/0x20 [ 270.056838] ? dev_queue_xmit+0x17/0x20 [ 270.060797] __bpf_redirect+0x5b7/0xae0 [ 270.064769] bpf_clone_redirect+0x2f6/0x490 [ 270.069074] bpf_prog_bebbfe2050753572+0x12c/0x1000 [ 270.074081] ? lock_downgrade+0x8f0/0x8f0 [ 270.078215] ? find_held_lock+0x36/0x1c0 [ 270.082348] ? lock_acquire+0x1e4/0x540 [ 270.086395] ? bpf_test_run+0x1f3/0x3b0 [ 270.090440] ? lock_downgrade+0x8f0/0x8f0 [ 270.094575] ? kasan_check_read+0x11/0x20 [ 270.098706] ? rcu_is_watching+0x8c/0x150 [ 270.102846] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 270.107243] ? bpf_test_run+0xaf/0x3b0 [ 270.111120] ? bpf_prog_test_run_skb+0x62a/0xa30 [ 270.115863] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 270.120704] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 270.126225] ? fput+0x130/0x1a0 [ 270.129489] ? __bpf_prog_get+0x9b/0x290 [ 270.133534] ? bpf_test_finish.isra.7+0x1f0/0x1f0 [ 270.138356] ? bpf_prog_test_run+0x130/0x1a0 [ 270.142746] ? __x64_sys_bpf+0x3d8/0x510 [ 270.146787] ? bpf_prog_get+0x20/0x20 [ 270.150584] ? ksys_ioctl+0x81/0xd0 [ 270.154195] ? do_syscall_64+0x9a/0x820 [ 270.158155] ? do_syscall_64+0x1b9/0x820 [ 270.162211] ? finish_task_switch+0x1d3/0x870 [ 270.166699] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.171616] ? syscall_return_slowpath+0x31d/0x5e0 [ 270.176531] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 270.181878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.186797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.192169] Modules linked in: [ 270.195479] Dumping ftrace buffer: [ 270.198998] (ftrace buffer empty) [ 270.202758] ---[ end trace 2c302777c0a564f9 ]--- [ 270.207532] RIP: 0010:ip_do_fragment+0x2468/0x2ae0 [ 270.212472] Code: 8b 8d 70 fe ff ff e9 67 e8 ff ff 4c 89 ef e8 df 7a 57 fb e9 49 e9 ff ff 4c 89 f7 e8 d2 7a 57 fb e9 c1 e5 ff ff e8 b8 a0 19 fb <0f> 0b 4c 89 e7 e8 be 7a 57 fb e9 85 e8 ff ff 4c 89 f7 89 8d 70 fe [ 270.231728] RSP: 0018:ffff880195016880 EFLAGS: 00010246 [ 270.237208] RAX: 0000000000040000 RBX: ffff8801ce7be940 RCX: ffffc90002a12000 [ 270.244509] RDX: 0000000000040000 RSI: ffffffff86626ae8 RDI: 0000000000000005 [ 270.251792] RBP: ffff880195016a58 R08: ffff8801c66e8180 R09: ffffed00323180ba [ 270.259075] R10: ffffed00323180bc R11: ffff8801918c05e3 R12: ffff8801ce7bea04 [ 270.266352] R13: 00000000fffffff2 R14: ffff8801ce7bea10 R15: dffffc0000000000 [ 270.273649] FS: 00007effc88a9700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 270.281889] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.287823] CR2: 00007ffdeada9000 CR3: 00000001b3b5d000 CR4: 00000000001406f0 [ 270.295108] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.302389] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 270.309673] Kernel panic - not syncing: Fatal exception in interrupt [ 270.316763] Dumping ftrace buffer: [ 270.320441] (ftrace buffer empty) [ 270.324134] Kernel Offset: disabled [ 270.327837] Rebooting in 86400 seconds..