openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:47 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {0x2000000000000000}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000604ffc)) 15:00:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000190001000000000000ff010000010000000000000000000000000000000000000000000000010000000a0000862d00000039c92a8ffb336d8c56d52264dd9347fdab3dfbed8e77574b50c94c59ad2e9cbe5eeeb7a8e77aee37cb7129d53cb396c4895cb751e125ed99c868eba66027aa269180c06ce1c8e9905e2f7487408416ad252e48c2a639599f0b122557d784ffa6e7f98fe3a11cbe96a05822084fac1d73c1b58136db7a26d556f1caf00e96fd69b8dc4044c0b56e50930e2558a2d712d4f721a38235a738fba29ef95712441b1b52e7068605dcad46509b7986f57984", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:47 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x101, 0x140) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x4c, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @rand_addr=0x9}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x17}}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e23, 0xd, @empty, 0x7}}}, &(0x7f0000000240)=0x84) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:00:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) 15:00:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000240)='bdevppp0\x00', 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000001300)=0x9, 0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r4 = getpgid(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x7fffffff, &(0x7f0000000300)=""/4096) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000080)='ppp0,^\x00', &(0x7f00000000c0)='bdevppp0\x00', &(0x7f0000000100)='\x00'], &(0x7f0000000200)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00']) 15:00:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="8700000007a8cff5f54d527570fed7d36e1d4d865414450167c37ee09f6759611b0e7b9cc27f6d310c69c754ce943be364714846be1a298d1feb806821c16c178ed15c8b089cfdaade47289ca0f57585963982a92f16c2412c17bd639ecd197cc2034fe35111c3cd130073f84865825a00001b04809a0eb3afdf5afae1819c5957e1081a1426fe90dd62b4"], &(0x7f0000000040)=0x8f) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000002c0)={0x81, 0x16, 0x100000001, 0x293, "e63e9eaf1ad4cffb20e2764db19bd46ff43a5bc22fc8aedef2fad4c83a05a482"}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0x5, 0x85, 0x4a, 0x8, 0x5}, 0x14) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:00:48 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000014000000000000000000000000000000000a00000000000000a0fa18702ea7eb764ecab0d2ac9d296397a7", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:48 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f00000000c0)={0x80000001, 0x2, 0xf8f}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:00:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5e6b, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="ff33c15de8b6d17c5704468935273e50135b7c3b92a9b9d634bbf907d117bc2a86d22a6a4d39e4984168eb2646a40d58708a4f500f927f0249d39cea9c76fd33dc00a0a9cbbc66fbdcd4a60d524f5365b16a9f5658c471ef79e2bcd06f561b697befb3b7712b62a790a602dcea2add8ecfc008bb9abdc6e79db8e3f0c44a3a28ca5594ae50afa7449ca7f6c5d517d155b3882ab40fdebd874fa9e9f9f055c52b7a2ed97e03444cab7cb9aff24958491bc173ef31542805edb9b4aa654a3796a029842a6314a7828912fe49b819") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x3, {0x4}}, 0x18) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000604ffc)) 15:00:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x1}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000140)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000280)={0x200, 0x55, 0x4}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x1}) 15:00:50 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup2(r0, r0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000180)) ioctl(r0, 0xfff, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4040040}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0xec, r4, 0x106, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x2}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5c}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0xd}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000001}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x32}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0xec}, 0x1, 0x0, 0x0, 0x10}, 0x80) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000006d0cbae6e74e9ad3b31142efc4e94d5cd11b7f58c5e19c0deb3c9cf23201e272543e32"], 0xb8}}, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000040)=""/38) 15:00:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x200000) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) 15:00:50 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x6, &(0x7f0000000000)="21662af40097a4e0bb15f400783602dc3f1ea39fe619479d0654701e4a186ecc90475a82ad44a550062e1f474fed0b50b67c9e855d") ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) write$sndseq(r2, &(0x7f0000000100)=[{0x1, 0x3, 0x2, 0x6, @tick=0x9, {0x8, 0x101}, {0x200}, @ext={0x57, &(0x7f0000000080)="8bc7464fbee32c793ca9aa28bfc4f1d1e0e9c212a35071ac17ba8fc581d59979f2bc8f2ff0b44639b884bca85b71feb251cd70f5d102dc8866f810ebcf2513dfeed1f97c12354772025f08423e2f1b4cdc748bbfd93ae5"}}, {0xfffffffffffffffa, 0x9, 0x9, 0x2, @tick=0x7, {0x100000001, 0xfffffffffffffff9}, {0x6, 0xc00000000000}, @result={0x7, 0x7}}, {0x7f, 0x1, 0x8, 0x7, @time={0x77359400}, {0x100, 0x6}, {0x800, 0x7}, @addr={0x10001, 0x991}}, {0x4, 0x100, 0x8000, 0xfffffffffffffffb, @time={0x0, 0x989680}, {0x1, 0x1}, {0x1f, 0x4}, @result={0x0, 0x80000000}}, {0x100000001, 0x6, 0x1000, 0x200, @tick, {0xff, 0x8}, {0x5635, 0x2}, @note={0x7, 0x3ee, 0xffffffff, 0xc2d, 0x20}}], 0xf0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000200)=0x1ff) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) 15:00:50 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f00000000c0)={0x80000001, 0x2, 0xf8f}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:00:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getuid() writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="b1fca8859cd475afc3fba98fd002c8b458b36dfd48ef4b5b49f7e9a03f04531404e59021cacbad9545dfe14ff07f6293cdea940a97fba64755d9e5a3b439cb45da5044d66b7b1313bf969e5b24962c4078b5a5"}, {&(0x7f00000002c0)="b30dfa164893fb4bb976df6244a3199d20928dd23998acd2907bb7d377a0e1df404b373ba8ac8418b98ebec2f6feac31118112e21e5b61f814e4e35cda4c4b8551919889a98c0b490d62b681de222a684fd5aecaf3383b572f84f3ae868d9937c24411c00b572cef0b4223c34623560339fedd597aadafe51c501d49a3038cad73241d8f0f95b8904e60f493bffa04931037f1d4e823d30dc11380863938729c067874c152ac559d7043341c3474d198c74856aaea8d8511cc4bd07300f869eee5397cd7fc1d881868181924168801c9895a0ef8d7449a2185f06e5cc7983cdff1ac262342952dda293eebd418bf40a286c673"}, {&(0x7f00000003c0)="d407977c9f20016801d852fd9a5f82254da23f027e3470a94a25664f0b4410e4701a359651530cc05ee78b4d9800f2055941fe13248f830c2a1e80bfc0a6718d9e55eb5f74fd60a51880010da1f5596c0cfdcc84d81db79d7c14343084935e72c711ed9065b070f80583855ee86cc6fd01a410b4b2bad51cb664352efd23e732"}, {&(0x7f0000000440)="4444c6ccfb95be412fe6be25175b7727f5ca3e625cb85403202537c9d613e3e3947c78cabb6aba64132058a3adee062990061a986952e8b8d5367a79d1b9c1edc56d0aece2988a73b9ff84792f417bcdfae05864eaeb20da68df4a3bbdd7ac2a9766cae2ea7e0f2d3e57"}, {&(0x7f00000004c0)="44418a7e574a435b03b7a9d4b7aadc3e10fb8aae39dcfc8070c7b7049943b9cb7f065b487947a59e3c768715f943ef5228165698b6eb31b9989681b046f5e550e9c32e3a7ce174d78b0c7dd12c794fe385bcd5ccfdb99a1a08d065d599a64a25c76a9ac5b0b9d3cc212b94c0a43f507d03393d44397d5e52902f212e47cd275abd8187ccf2a9538a9625161330220473cf9220c8872a5ab6fcf6af6d6aa5d06b4b2f9d29073bc5782da73f5412051a870f705b0a52a58baee10ae69ca9cfc3d51f2145"}, {&(0x7f00000005c0)="9bf523ba9012dd1390df051d8a1d3f8da832a0152dca9541d1a5c1c5031088b42d43e5d2895113793128145eccea44835cf0975f45f7f8efdff44d250c1f2a25c4e67d8e471f1240d537d106540a059182b6f70a301e960a5632"}, {&(0x7f00000008c0)="bfca6d50cd1838100dae83d03edd4b522bbb79400e8d22af03ecf661776b912e6fbdcc74338222f08fa81d397f716eb39c96437ab0b67db9a3f46f0f7dbdae"}, {&(0x7f0000000640)="1679dbbc8e97d96cf2271f2d5ee63ae5b221d4a473292e2026659d1f423bbc78a926a977f67e2d7357b29774f217d91fff6ab2722172ae1323275eb4cea544580a3785d47cb67014db336ec0368f112668e1ddf92eb5e0496b712684dbf43427094207c2153b6a3008418be60cb1aa4a8652a078a918797fa411928316d13dd715a95e96d6432aed7c7448b42b0a48d755afc30126016f0f38918da03c549628"}, {&(0x7f0000000840)="459b000200000000f42b925398f5e1778b8f4e28b338239528943a9fb6f242b06048410ce17ec0fced0be6d99e7d675f52714dd0ad1f79475c349d9c96eaa27492301c25bda72588a75f828b505d4a2b8923720f788eb376daf2a7aa62be3ff9a7c52258a89b5aa22d93ba93d6f5bfeff29f286306ad1b899aa3fd"}, {&(0x7f0000000740)}], 0x10000000000002ed) accept(r0, 0x0, &(0x7f0000000040)) 15:00:51 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000080)={0x6, 0x2, 0x5, 0x9, 0x3, 0x2, 0x81, 0x4, 0x800, 0x1}) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x268}, &(0x7f0000000080)=0x8) msgget(0x0, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x2}}, 0x1, 0x6, 0x3f, 0x2, 0x8}, &(0x7f0000000180)=0x98) 15:00:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:00:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9e9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) getegid() sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="b800003f00000000000000655b7dd0aa98a601000200000000000000fe010000000000000004000000000001e00000010000000000000000354d30f92704f3c1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002cef4733438ba5bc0775491fcb94acd2e080e1ace7db174fb0eceb0d93"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:54 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100)=0x22c2, &(0x7f0000000140)=0x2) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000040)="0b0900f580fa2f", 0x7}], 0x1) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @local}}, 0xe315, 0xdd, 0x7ff, 0x6, 0x4}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000003c0)={r1, 0x7}, 0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000240)=0x4) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000400)=0xffffffffffffffff, &(0x7f00000000c0)=0x2) 15:00:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffe00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) socket$inet_smc(0x2b, 0x1, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000000)=""/53, &(0x7f0000000180)=0x35) 15:00:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:54 executing program 1: r0 = socket$inet6(0xa, 0xb, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff01000000002a000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:54 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f00000000c0)={0x80000001, 0x2, 0xf8f}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:00:54 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa80, 0x0) getsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f00000000c0)=""/225, &(0x7f0000000000)=0xe1) connect$can_bcm(r0, &(0x7f00000002c0), 0x145) shmget(0x3, 0x4000, 0x400, &(0x7f0000ffb000/0x4000)=nil) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:00:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:54 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) arch_prctl(0x1001, &(0x7f0000000040)="af1085576be0d3d41353a5730c3bca34d99de3fae27753d9849a8984aecba38358b6297a34539861e4f22f0ec92c62536a84f5aa8710629cbdcd9eeb7924c73e140d6e7feb3e627e39e716970d1d4ccacdf37e6ea689b943c501690a49140d71791fc8a2ca4d3bee9dee07aa7ab00753a8f520da27d3e15e56bf41f25aabc09788b5d20fb2c884fe5f3edf2d9bdebf456cca55b45f27f72beef821c70769d546a87454eae78c69135bcec68aa3eb4c5fb846509d42993075089098674d1f4d83168d754150a6b5be345e1e00ed97d75df5974109d155fb035a514e197c909fcbbaeeda7fba93afa6563123ab89876401d27cc06e4aa8") sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = dup2(r1, r1) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000140)={0x7, r0}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f00000001c0)={0x0, 0x6, 0x8, {r2, r3+30000000}, 0x7, 0x6}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000604ffc)) setsockopt$inet_dccp_buf(r4, 0x21, 0xc0, &(0x7f0000000080)="b51c7c0a3ecd2d7b5ad767485745c996c47daf5b22924fb3d4ae557124a203e558f3cca7f293d9e60bd556be1c5de02a1bc6e08166f25e6666ad90f092a2c1f33d19d8d6d7ccf608b758039d2a75ebb95834ff111546d731fccfb6e61b3b85a2b1644bf047733037c64e3d0e03c27cd73652d31c462af26bca2244f21cda5bf9600d7bc6c363f1fa2c6fab6f6b2e1a424348c4be6124ca8dfb17adceb3f49e3dc35a2ba92c958b8c14902af5e419bf96ab250ab08559a9430df809b0346849525c9023f93e", 0xc5) 15:00:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001500)='./file0\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) listxattr(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/30, 0x1e) recvmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000040)=""/51, 0x33}, {&(0x7f00000012c0)=""/76, 0x3aa}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000240)=""/35, 0xffffffffffffff57}, {&(0x7f0000001340)=""/40, 0xffffffffffffff26}], 0x6, &(0x7f0000001400)=""/173, 0xad, 0x4}, 0x10000) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="000000000004", 0x6}], 0x1) 15:00:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x11000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3800000000000000, 0x0) 15:00:57 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x400, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="a0715fac741e2e9d07fab9d64e057a289576f256ab40689fc03f034a390f45f4afb4ae8b742cbc1dc0b45fd9831d2c0e36720e76399f105324dcc12af192632a89f97a714e2b943142f064cae8749011405099679514c5aa5b920f63c7fcdd45110b4e4a80da15d606259a5222e391108f0a49528c50dbc0", 0x78}, {&(0x7f0000000100)="ec70d8cef6b4d75b1ff3e3012521323b7efbdf7a5519cd18d30f4445de7700b3889df088ed14c48f4412dce922fd853093239be1a822c72d1467c7c38bab338c35c48d53df75cab63edc063c32d215018644eb1608e7e3ab634a663aedfa6bc2cd93794a43a93afba797", 0x6a}], 0x2, 0x0, 0x0, 0x40}, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r1) ioctl$KDADDIO(r2, 0x4b34, 0x100000000) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000604ffc)) 15:00:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000000890f, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) shutdown(r0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f1d577943d89d380000000000000000000000000000000000"], 0xb8}}, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x4000) setsockopt$inet_mreqsrc(r3, 0x0, 0x0, &(0x7f00000001c0)={@broadcast, @local, @remote}, 0xc) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x12442, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000000c0)={0x78, 0x8000, 0xfffffffffffffffe, "0064bfed6e33b84ea54b9c8a152cfceb928b3ef236fec7001334a4f9b7aa7d2b80a1ea13f4dd949e196608256b921536940f391315d9a83a3368217f07e27491cf817adb7a6f5afcb0280ec79b3fcd0f77f16f05d74174b4bd65560cd27286eb73925779fc51b628196b5e6c9f5786f4dc6c166bf4bb9666"}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x12) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:00:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:57 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f00000000c0)={0x80000001, 0x2, 0xf8f}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:00:57 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x842) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="736563757269747900000000000000000000000004000000000000000078670000000000000000000000000000000000010000000000000000000000000000ddff00000000000000000000000000000000000000000104000000000000005e928ad741fb377a7787b87f77e3ed313b1d153e194d54f003123ae088f4e327cbdae95a77f2e284f129a452b490605084f36f302145c8f462669e29ee61328e8d1d5eb8b2e056b965577b1693ea7e549913492129ade7c686fd3515fd7588fd4b12467b4585b86f0921a12e8f3e0a1a4a658f5e0d81bb24bb100d4b2cad995accd1e817baeeac61"], 0x68) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0x80000001) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:57 executing program 6: r0 = socket$inet6(0xa, 0xfffffffffffe, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) 15:00:57 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x2d, 0x3, 0x0, {0x4, 0xc, 0x0, '/dev/rfkill\x00'}}, 0x2d) writev(r0, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000340)=""/190) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000200)=""/51) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 15:00:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) write$FUSE_POLL(r2, &(0x7f0000000080)={0x18, 0xffffffffffffffff, 0x5, {0x100000001}}, 0x18) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000000c0)=0x5) getpeername$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000002c0)={r4, @broadcast, @remote}, 0xc) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='/dev/audio\x00', r1}, 0x10) ioctl$LOOP_SET_FD(r2, 0x4c00, r5) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000180)={0x0, 0x6e, 0x8001, {0x77359400}, 0x3, 0x1}) 15:00:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:57 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x108, r1, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x6c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffff}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8201, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair(0xf, 0xf, 0xf, &(0x7f0000000040)) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:00:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000080)={{0x84, @empty, 0x4e20, 0x1, 'lblcr\x00', 0x10, 0x1, 0x2e}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x4e20, 0x4, 0x1, 0x7fff, 0x1f}}, 0x44) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_mreqsrc(r2, 0x0, 0x2f, &(0x7f0000000100)={@loopback, @rand_addr=0x7f, @dev={0xac, 0x14, 0x14, 0xf}}, 0xc) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) sched_yield() connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:58 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0x401, 0x3, 0x7}}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101000, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x441, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000604ffc)) 15:00:58 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:00:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:58 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f00000000c0)={0x80000001, 0x2, 0xf8f}) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:00:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x2, 0x4c83, 0x81, r1}) 15:00:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:58 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000192600000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a000000000000009f33e3282361e9de8117d7ec420276613b51c65784862368dee6c527c9a23016adee89620a00b5affdd35eba", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:58 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:00:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x81, 0x10000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xa) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000604ffc)) 15:00:58 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) r1 = geteuid() setuid(r1) 15:00:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:58 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) 15:00:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008958c65dd482ce59600ac5f6aa0000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000002c0)="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") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10107e, 0x0) r2 = geteuid() r3 = getgid() write$FUSE_ENTRY(r1, &(0x7f00000000c0)={0x90, 0xfffffffffffffff5, 0x5, {0x5, 0x1, 0xff, 0xd239, 0x81, 0x1f, {0x2, 0xffffffff, 0x10000000200000, 0x7fff, 0x4, 0x80, 0x191, 0x80000001, 0x4, 0x912f, 0x114, r2, r3, 0x3, 0x3}}}, 0x90) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x400, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="c01ae511955719", 0x7}], 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000003c0)) 15:00:58 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840), 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pkey_alloc(0x0, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$int_in(r0, 0x5473, &(0x7f00000000c0)=0x7ff) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100)=0xb5c7, 0x331) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pkey_alloc(0x0, 0x3) ioctl$KDMKTONE(r1, 0x4b30, 0x4) write$sndseq(r2, &(0x7f0000000080)=[{0x3, 0x5, 0x0, 0x1, @time={0x0, 0x1c9c380}, {0x1, 0x9e}, {0x7}, @time=@time={0x77359400}}], 0x30) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'rose0\x00'}}, 0x1e) 15:00:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d76607059578c5e20fc313380c100b45c8a48892b0be9") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101080, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x1) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[{@nls={'nls', 0x3d, 'iso8859-4'}}]}) 15:00:59 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840), 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:59 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x31) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6, 0x0, 0x33}, 0x0, @in=@broadcast}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 15:00:59 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840), 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:00:59 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:00:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 394.013014] hfsplus: unable to find HFS+ superblock 15:00:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(r2, 0x1f, &(0x7f0000000040)="283865385a6f97bd4b08f21d4308694a24a97fb2a6d3188f15bae387135c0afeddcf1e7f7fa272") connect$l2tp(r3, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x3, 0x2, 0x4, 0x1, {0xa, 0x4e20, 0x3f, @ipv4={[], [], @remote}, 0xfff}}}, 0x32) 15:00:59 executing program 6: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="0b0000002901001f000080"], 0xb) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$P9_RLOCK(r2, &(0x7f00000000c0)={0x8}, 0x8) [ 394.078060] hfsplus: unable to find HFS+ superblock 15:00:59 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840), 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:59 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840), 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:59 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)) 15:00:59 executing program 1: pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000640)=0x4000, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x80080) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240)=0x1000, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000440)) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000340)=""/228) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000000000000"], 0xb8}}, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c6530202d20656d316170757365742f0a1fc4e8a365ec1153eb031ca22f89f1229a71f99abeff940f372951a2a8cbe83102ab426ee02a7688644ceac82867a987687f71e3c922d396b8ff6bc46844d66955e3b3175346"], 0x5e) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = accept(r1, &(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r5, 0x800442d2, &(0x7f00000006c0)={0x0, &(0x7f0000000680)=[{0x0, 0x0, 0x0, @dev}]}) r6 = add_key(&(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_security(0x11, r6, &(0x7f0000000500)=""/247, 0xf7) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000300)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 15:00:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:59 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:59 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840), 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:00:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:00:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000000c0), 0x10) 15:00:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:00:59 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(0xffffffffffffffff, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:01:00 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000000c0), 0x10) 15:01:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:00 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000016) 15:01:00 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') lseek(r0, 0x0, 0x0) 15:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@l2={0x1f, 0x8, {0x0, 0x2, 0x4, 0x3, 0xc9, 0x8}, 0x100000000}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)="bb2db62cb8daa43f2aca7c6ca79372ae6e34f2e67e3122ccc1de5e71d98c0d242c6ac72dcb6594b204d413a5f2fd73a9d2", 0x31}, {&(0x7f0000000100)="b83b9c106b7974e5b0eb7bc651bf7cc5f8ca0d875ce272f2ca6e385d567d4c8c15a3662ca297d2e9ade45b4aa5", 0x2d}, {&(0x7f0000000140)="704d32fac2a3c124302ee5d125ed016ff0e020f186f339747c1bfdc8986236f534d8490c7e6dc338e50785", 0x2b}, {&(0x7f0000000180)="86a23e1f2daec3643285e375a5b4526c71c5645483806929cf6dc6d93bf9c65fb3435655686c8ea7ca7e8ef6dce3f2b8aac5b086f8d056353307c1b823e25f454abe2f3f05545973387895b4b3d9f0d79a72cabc1154da7c5b4b2b099c9f0b8631b58cbbed1eb245d7bbe442eb58da3b6ec240e63d0212c09d3cb019e29c9f016acf612e0f89619a02940540eb29143fb15a6e59482d1366df89cd37d22de9140d2d19dcb980b62077432ee4200e1bcc23432d4d4ad439bc1c1cb1981d7d72942ecf", 0xc2}, {&(0x7f0000000300)="71d447ab9b5974f5a0dcc76116aee8391e2b0d5c3a2e834eb12d5901c972d6e1b7ff7a85a8a597846c1c107551dda78ba643e98fc85a3dbd8ba6dc2630910d73c8c3c2dc69baca034e8cce75ca995d47a847", 0x52}], 0x5, &(0x7f0000000400)=[{0xb0, 0x11, 0x4, "36a8932f5d707b7daa0ec05cd6ae8335f182c528e6aeaa3e1838c0d60cbfae045d449f5d5cc5d1cf06c1968e802884a282d85f61bbfcd1bce3cc88fce40bbb2d3362ad3fda7f94166700127aed345cf9fe74da84e46f56ef36b3de7b41f395735560c5a505c8db536db042b166a7b0ad8d4f1c887fc01f899328d1a7420104219e8945d6b7bdd096568976d78b44be1c5abfe0d8f263470ec312"}], 0xb0, 0x24000040}, 0x4000040) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ppp\x00', 0x8000, 0x0) symlinkat(&(0x7f0000000500)='./file0\x00', r2, &(0x7f0000000580)='./file0\x00') r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:00 executing program 6: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f00000000c0)={0x43ff}) 15:01:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 395.172309] EXT4-fs (sda1): resizing filesystem from 524032 to 17407 blocks [ 395.179737] EXT4-fs warning (device sda1): ext4_resize_fs:1929: can't shrink FS - resize aborted [ 395.250790] EXT4-fs (sda1): resizing filesystem from 524032 to 17407 blocks [ 395.258060] EXT4-fs warning (device sda1): ext4_resize_fs:1929: can't shrink FS - resize aborted 15:01:00 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) syz_open_pts(r1, 0x0) dup3(0xffffffffffffffff, r1, 0x0) tkill(r0, 0x1000000000016) 15:01:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000000c0), 0x10) 15:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x1115, 0x323000) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x81, 0x80000) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000140)={{0x8, @multicast2, 0x4e23, 0x3, 'lblcr\x00', 0x20, 0x800, 0x57}, {@multicast1, 0x4e22, 0x4, 0x7ff, 0x4, 0x5}}, 0x44) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4040, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) ftruncate(r0, 0x3ff) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r4, 0x2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:00 executing program 6: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000140)="06"}) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 15:01:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 395.536084] binder: 21908:21912 ERROR: BC_REGISTER_LOOPER called without request [ 395.606417] binder: release 21908:21912 transaction 6 in, still active [ 395.613501] binder: send failed reply for transaction 6 to 21908:21912 [ 395.669452] binder_alloc: binder_alloc_mmap_handler: 21908 20001000-20004000 already mapped failed -16 [ 395.706259] binder: BINDER_SET_CONTEXT_MGR already set 15:01:01 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x80003, 0x2c) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000000c0), 0x10) 15:01:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b80000da8b0001000000000000000300ff010000000000000000000000000001e00000e80000000000000000000000000000000000000002", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="4000000000000000000000001600002923000000001a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009219f636a38700000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='d#selinuxkeyringmd5sum%\x00', 0xffffffffffffff9c}, 0x10) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0x9) socket$rds(0x15, 0x5, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10010000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 395.714363] binder: 21908:21912 ioctl 40046207 0 returned -16 [ 395.722738] binder_alloc: 21908: binder_alloc_buf, no vma [ 395.728701] binder: 21908:21921 transaction failed 29189/-3, size 0-0 line 2970 15:01:01 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) syz_open_pts(r1, 0x0) dup3(0xffffffffffffffff, r1, 0x0) tkill(r0, 0x1000000000016) [ 395.798220] binder: 21908:21912 ERROR: BC_REGISTER_LOOPER called without request 15:01:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000000c0), 0x10) [ 395.865144] binder: undelivered TRANSACTION_COMPLETE [ 395.870584] binder: undelivered TRANSACTION_ERROR: 29189 15:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xfcc, &(0x7f0000000300)="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") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom$inet6(r0, &(0x7f0000000040)=""/45, 0x2d, 0x2100, &(0x7f0000000080)={0xa, 0x4e20, 0x7, @ipv4={[], [], @rand_addr}, 0xfffffffffffeffff}, 0x1c) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff01000000000000edff000000000001e000000100000000000000000000000000000000879500000a0000000000000027372ece984323b02347effc26f14929b56884c787ad493d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000300000000000000ffff0000000000000000000000000000020000000000000000000000ac794081de07db3d37da00000000fff07ad3766c61fd6500df000000000000000000000000000000009800000000000000000000000000000000f4540dac849ced3897344f8ebbadbd3326eb64407425a7d387f694f941452602c848812975517c28ad469baa4a0b6aaf1396eaba3e74370aa205ebd665efb2fd8632d8b72a54617179e31f"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 395.909575] binder: undelivered TRANSACTION_ERROR: 29189 15:01:01 executing program 6: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000140)="06"}) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) [ 396.111145] binder: 21958:21959 ERROR: BC_REGISTER_LOOPER called without request [ 396.179338] binder: release 21958:21959 transaction 9 out, still active [ 396.186550] binder: undelivered TRANSACTION_COMPLETE [ 396.221842] binder: release 21958:21959 transaction 9 in, still active [ 396.228776] binder: send failed reply for transaction 9, target dead 15:01:01 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 15:01:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb500, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:01 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f00000000c0), 0x10) 15:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:01 executing program 6: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[{@nls={'nls', 0x3d, 'iso8859-4'}}]}) [ 396.429350] hfsplus: unable to find HFS+ superblock 15:01:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000000c0), 0x10) 15:01:02 executing program 1: r0 = socket$inet6(0xa, 0xe, 0x3) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:02 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) fcntl$addseals(r1, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 396.640075] audit: type=1326 audit(1536246061.997:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21965 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:02 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 15:01:02 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0xfffffffffffff000, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 15:01:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f00000000c0), 0x10) 15:01:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xd8, 0x20000) openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x82) 15:01:02 executing program 0: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) tkill(0x0, 0x1000000000016) 15:01:02 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e2, &(0x7f0000000100)) 15:01:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x13, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:02 executing program 6: 15:01:02 executing program 1: r0 = socket$inet6(0xa, 0xfffffffffffd, 0x81) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000500)=ANY=[@ANYBLOB="760c080000f8ffffff010000000000000000000000000001e00000010000040087000500000000000000000000000000080000000000000059259a68901fb6cfe41ab74adc21339bc0935e41062250ad67cf263619b8ddd122027109663b5dcd2455c15beafab50d27ef3cdb89bee374b4877a3db0f7db3311f9801e2a0649c141da528e6c18ff6c0d0000e6878b2b9e919108a58ea7921113fea15d7e66a04fe92cb099de2d30623e253f971184926e384400000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000459bac3200fd8d464a9f000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x420400, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f00000004c0)={0x6, 0x20}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000080)) fstat(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000300)=[0x0, 0x0]) getgroups(0x4, &(0x7f0000000340)=[r4, r5, 0x0, r6]) 15:01:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff97, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:02 executing program 6: 15:01:02 executing program 3: 15:01:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x6, 0x5, 0x8009, 0x1, 0x1, 0x3e0b, 0x1c00, 0x5, r3}, 0x20) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:03 executing program 5: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r0, &(0x7f0000000040)=""/48, 0x30) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) tkill(0x0, 0x1000000000016) 15:01:03 executing program 6: 15:01:03 executing program 3: 15:01:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1f) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x100, r1, 0x28, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x14}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffff9f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x54c4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x45a}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xa537}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:03 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x0) 15:01:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:03 executing program 3: 15:01:03 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x1fffffffffe, 0xfffffffffffffffd, @dev={0xfe, 0x80, [], 0x1a}, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:03 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:03 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 15:01:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:03 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) [ 398.351622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 398.372732] loop1: [CUMANA/ADFS] p1 [ADFS] p1 [ 398.390445] loop1: p1 size 117440512 extends beyond EOD, truncated [ 398.506293] loop1: [CUMANA/ADFS] p1 [ADFS] p1 [ 398.512960] loop1: p1 size 117440512 extends beyond EOD, truncated 15:01:03 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) read(r1, &(0x7f0000000040)=""/48, 0x30) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x0) 15:01:03 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:03 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe909, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:04 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @local, 0x4}, 0x3a1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x28000, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0x57e3, &(0x7f00000000c0)=0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0xffffffff, @loopback, 0xffffffffffffffff}, 0x2d3) 15:01:04 executing program 7: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8801b80fa578, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:04 executing program 0: 15:01:04 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mq_open(&(0x7f00000000c0)='!em1ppp1\x00', 0x0, 0x80, &(0x7f0000000400)={0x5, 0x7, 0x3f6, 0x9, 0x2, 0x0, 0x352c, 0x3}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80002, 0x100) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000080)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @rand_addr}, &(0x7f0000000140)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={&(0x7f00003c7ff4), 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="f40000001d00080026bd700000000000e400060000000000000000000000000000000001e00000020000000000000000000000004e2102004e200000000000a062000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ff020010000000000000000000000001000004d433000000fe8000000000000000000000000000aaff030000000000000200000000000000ffffffff00000000090000000000000003000000000000000400000000000000000000000400000000020000000000000800000000000000060000000000000001000000010000000200000000000000030000004a3305000000000026bd700003350000000004020200000000000000"], 0x4}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:04 executing program 3: 15:01:04 executing program 0: 15:01:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:04 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet(0x2, 0xa, 0x80000000) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x20000) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) 15:01:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8801d71f3738, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:04 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:04 executing program 3: 15:01:04 executing program 0: 15:01:04 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:04 executing program 5: 15:01:04 executing program 3: 15:01:04 executing program 0: 15:01:05 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x9b6, @loopback, 0x4}, 0xffffffffffffff34) 15:01:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x2000000000008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') 15:01:05 executing program 3: perf_event_open(&(0x7f00000000c0)={0x800000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 15:01:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket(0xa, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xf401, 0x0, &(0x7f0000000200)={0xa, 0x4e24, 0x0, @loopback={0x0, 0x8}}, 0x1c) [ 399.832598] QAT: Stopping all acceleration devices. 15:01:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x800) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f00000000c0)={{0x3c, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e20, 0x4, 'dh\x00', 0x20, 0x9, 0xb}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e24, 0x7, 0x9, 0x40, 0x9}}, 0x44) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 399.865012] QAT: Stopping all acceleration devices. 15:01:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0xa) recvmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f00000002c0)=@un=@abs, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000005c0)=""/75, 0x4b}, 0x200}], 0x1, 0x0, &(0x7f0000000b40)={0x0, 0x989680}) 15:01:05 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:05 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:05 executing program 3: exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendto(r1, &(0x7f0000000000)='T', 0x1, 0x0, 0x0, 0x0) 15:01:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) dup2(r3, r1) 15:01:05 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, &(0x7f00000000c0), &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) [ 400.307981] kernel msg: ebtables bug: please report to author: Valid hook without chain 15:01:05 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000040)=0xfffffffffffffeff) 15:01:05 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 400.371287] kernel msg: ebtables bug: please report to author: Valid hook without chain 15:01:05 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x6, 0x800, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000000180)=""/4096}, 0x18) 15:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) dup2(r3, r1) 15:01:05 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00458c65da72e5c961000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:06 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000edc0000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) dup2(r3, r1) 15:01:06 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x8000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b667319266174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)) 15:01:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x0, 0xffff}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000400000000000000001e0000001000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:06 executing program 3: socket$unix(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) dup2(r0, r1) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x0, 0x8}, {0xa, 0x4e20, 0x0, @empty, 0x93}, 0x0, [0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x5c) 15:01:06 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 401.194903] FAT-fs (loop0): Directory bread(block 2563) failed 15:01:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x128}}, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x208200, 0x80) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000064, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000100)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 401.236133] FAT-fs (loop0): Directory bread(block 2564) failed [ 401.282523] FAT-fs (loop0): Directory bread(block 2565) failed 15:01:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffff60000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:06 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) dup2(r3, r1) 15:01:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20400, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x0) renameat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x10000, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000240)=0xcd2) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x6, 0x7ff, 0x2, 0x9c, "e636cfe40b7de541a88f1befb02267bddc67a1f2188458223c046fd70d8365f7256d5ab4272f922a70b2f117e454cd66027c53608505cf9be844c9d9e1e6aae12ea2a0e48c3c59cd93d17d1360392c437944d7c9813e4b642777104d192d78e791f00a0480a94fc0516063c2cfa195814038308cab9f85f38fd05497a8546e585f26c9fbcdc56ff9f1b87e92280d02d12761be474dbedb58f5652a6c"}, 0xa8) [ 401.328692] FAT-fs (loop0): Directory bread(block 2566) failed 15:01:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 401.381528] FAT-fs (loop0): Directory bread(block 2567) failed [ 401.424595] FAT-fs (loop0): Directory bread(block 2568) failed [ 401.469631] FAT-fs (loop0): Directory bread(block 2569) failed [ 401.503157] FAT-fs (loop0): Directory bread(block 2570) failed 15:01:06 executing program 6: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f0000000440)) [ 401.531509] FAT-fs (loop0): Directory bread(block 2571) failed 15:01:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x2c, r2, 0x820, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48041}, 0x4000000) sync() r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$KDMKTONE(r5, 0x4b30, 0x44) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000000040)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000065e5e95f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x4) fremovexattr(r5, &(0x7f0000000180)=@known='user.syz\x00') connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) prctl$getname(0x10, &(0x7f0000000100)=""/124) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x8000, 0xfffffffffffffffd, 0x3, 0x8001}, 0xfffffffffffffeb8) 15:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) [ 401.574972] FAT-fs (loop0): Directory bread(block 2572) failed 15:01:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='id_legacy\x00', &(0x7f0000000180)='vmnet1{em1mime_type)vboxnet1cgroupppp0/proc\x00') 15:01:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x1d) 15:01:07 executing program 6: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:07 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffff4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) 15:01:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) bind$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0xa) recvmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f00000002c0)=@un=@abs, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000005c0)=""/75, 0x4b}}], 0x1, 0x0, &(0x7f0000000b40)={0x0, 0x989680}) 15:01:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:07 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 15:01:07 executing program 6: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20100000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 402.119118] audit: type=1326 audit(1536246067.476:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22448 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 15:01:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0xfffffffffffffffc}, 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x161}}, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x20800) ioctl$TCXONC(r6, 0x540a, 0x7fffffff) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:07 executing program 6: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:07 executing program 0: accept4(0xffffffffffffffff, &(0x7f0000000440)=@xdp, &(0x7f0000000080)=0x80, 0x0) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) fcntl$setflags(r2, 0x2, 0x0) 15:01:07 executing program 6: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) socket$packet(0x11, 0x0, 0x300) 15:01:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000004000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:08 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x3, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010024b5000000000000008b000000000066ce656d316e6f246576656d310000000000000000000004000000002c00000000000061d1213823b7c94f5a3276ce100061000000000000001c000000000000002b7379737465746a48c29ba0ccfe628280889f65746367726f7570246367000000008486ce4e574bf121647ec088c72e0a4723f8309c04309a0a565248d374f409e59ccb78aa41f7f673668bc03576bae33180b43843fac85585a26bb7fadd"], 0xc1) 15:01:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:08 executing program 6: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000ec95504f389c20000000b537cb000000ff010000000000000000000000000001e0000001000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000aaf5000000000000000000000000000000000000000000c7cb81f9c2ffe7c95fac711fc362f1f98e6bab677deb113a13c17a48deab7b44b8dbd9462a0a960560701918af5b2c051368f07868567008319efa6f152d000546ecd4e15df577aa980ce6d261a02f7d707d8bd4206d6d629e921ff3e903b939bbdcae69f7075411e89d9f7e5cd70f752e3a85d8"], 0xb8}}, 0x0) [ 402.921735] audit: type=1326 audit(1536246068.278:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22448 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:08 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096102, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 15:01:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000001000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9e9, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x0, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xffffffffffffffd2, 0x2, 0x4, 0x80}) 15:01:08 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) ioctl$TCSBRKP(r2, 0x5425, 0x361) 15:01:08 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0x20}, 0x4}}, 0x7d27e19f, 0xffffffff, 0x1, "55500f9f2c84a560d047c35f34ae1b8e7ce309c76ce39e4a947851efe4ac1890ca2b0849fe36a82c5f1a185e6c03f5022b22cbb59f7e5e1c943d6be330f02337b5bdb2e5197512c6836a66565ea5e714"}, 0xd8) r5 = add_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000300)="aeec74a5924f8f21dcc9fa626688be3462227dd1980fa8519ce6fbd4f83547d8c796729959a17f010a25ce8241a5b56711e717538a2822eed32771e35393583058d517133d0b54daf52a3bab4899bec8436f83ed3388271ac7f864dfff2ed6968d926f468746b2af74127293def1921916b3fed24a66695f5bd72075c81d8a181808f3d55b129ae9649f76cc74f485975bdfb346e1aa239bf46402e7a9e74d9b98acd7d93c2f4e8691a064f5af", 0xad, 0xfffffffffffffffe) r6 = add_key(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r5, 0xec56, r6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000ca33fea5a4b126c87557549b5d000000000000000000000000000000000000000000000000deffffff00000000000000ac845900dadc3cde0000000000000000"], 0xb8}}, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:08 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") r1 = socket$inet(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000000c0)={0x0, @remote, 0x0, 0x0, 'lblc\x00'}, 0x2c) 15:01:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00400000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:09 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/55, 0xffffffffffffff07) fchmod(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f00000000c0)=""/127, 0x7f) 15:01:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1020, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x1b}, @local, @loopback, 0x1, 0x4, 0x200, 0x100, 0x8e5, 0x40000080, r4}) 15:01:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a03000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:09 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:09 executing program 3: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000001c0)={0x0, 0x0, 0x40, 0x9, 0x0, 0x0, 0x0, 0x2}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000380)=0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) 15:01:09 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) [ 403.689457] device lo entered promiscuous mode 15:01:09 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) [ 403.757054] device lo left promiscuous mode 15:01:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) 15:01:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a74000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x80, 0x0) renameat2(r0, &(0x7f0000000040)='./file0/file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'veth1_to_bridge\x00'}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r4 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000ec0)=0xe8) sendmsg$nl_xfrm(r3, &(0x7f0000000800)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000840)=@acquire={0x0, 0x17, 0x500, 0x70bd28, 0x25dfdbff, {{@in, 0x4d5, 0x6c}, @in6=@mcast2, {@in6=@loopback, @in6=@loopback, 0x4e20, 0x0, 0x4e20, 0x8, 0xa, 0x80, 0xa0, 0x3b, 0x0, r4}, {{@in=@rand_addr=0xa7ab, @in=@multicast2, 0x4e23, 0xa1, 0x4e23, 0x0, 0xa, 0x20, 0x20, 0x87, r5, r6}, {0x5, 0x5, 0x1, 0x4, 0x3, 0x8, 0xfffffffffffffffb, 0x4}, {0x8, 0x0, 0x7, 0x4}, 0x4, 0x6e6bb1, 0x3, 0x1, 0x3, 0x3}, 0x9, 0x9, 0x1ff, 0x70bd2d}, [@tfcpad={0x0, 0x16, 0x1ff}, @address_filter={0x0, 0x1a, {@in=@dev={0xac, 0x14, 0x14, 0xe}, @in6=@dev={0xfe, 0x80, [], 0x1b}, 0xa, 0x53, 0x3}}, @sec_ctx={0x0, 0x8, {0x0, 0x8, 0x1, 0x1f, 0x0, "c01a74f2a8900ff0251bb0fab426c3e32b182e5a248a052c24058020227684375270dcd1537821e924b9ea4f048d47c27c53"}}, @algo_comp={0x0, 0x3, {{'lzs\x00'}, 0x0, "46e09f58984cba7b46d63019b6ad457a609cb94e9506941183db17e99b17551dd948dcc1ac4493e8e463c6fd35dc46e3e43b5c47df199c01facf787f725a4e259fd95bafb3654f201296ec8b5f0944fa64e18ef07d33803a5befaf8ac3a06bbdd72adf40e74b2bb31979e7c58d06d1ee54b4b9d14733099f11197bd1f813b300731784181b5159ae"}}, @migrate, @proto, @lastused={0x0, 0xf, 0x6}, @tfcpad={0x0, 0x16, 0x800}, @sec_ctx={0x0, 0x8, {0x0, 0x8, 0x1, 0x6754b6c0, 0x0, "93e90ada0e9cb4c1ad3478e8552be158f51c1f523aead422775894642a699a1d26babdac4d0048d7ebc2a801ef00000a23c3"}}, @ipv4_hthresh={0x0, 0x3, {0x1a, 0xa}}]}, 0x195}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x1000000000) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) socket$inet6(0xa, 0x1000000000002, 0x0) 15:01:10 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000680000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 404.663981] device lo entered promiscuous mode [ 404.825158] device lo left promiscuous mode 15:01:10 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:01:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:10 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) 15:01:10 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffff50000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:10 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) r2 = memfd_create(&(0x7f00000000c0)="12218913c60000000000", 0x0) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 15:01:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) write$P9_RRENAME(r3, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x402c5342, &(0x7f00000000c0)={0x0, @time}) 15:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:10 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00011000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:10 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:10 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 15:01:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000080)='memory.max\x00', 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:10 executing program 3: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) recvmsg$kcm(r0, &(0x7f0000003840)={&(0x7f00000026c0)=@alg, 0x80, &(0x7f0000003740), 0x0, &(0x7f0000003780)=""/133, 0x85}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) 15:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000380)="c125150b8a3f92f3ea9f4f4cff4840f22c84eb83039bb84ce516ffe3758e97909449622ab6fd4488a4d6e3550821fb43b91db571830c8e825e79f55d8c5752c1513d124934e3f1d52b9c599a25d099cea309dd08c33a9496287a91a6e6e4f4495c20cefaa6082642c6002e53bc0f8806b934892225a58e79829c1138d62d687451d39b35ed23ab2aeaf0487da1da57cdfc1b742f2b688808afc539fabd46f49f17aed52addc1bce7cf14f4eaa5d6da24ec88fa229d178606232a55064727c16c8192fe90d0ca0ca9cee1f49cbb6d512cef0dbfc24e58caf9defe2a2827dd116988") openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) [ 405.511320] audit: type=1326 audit(1536246070.868:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22705 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdffffff00000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:10 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40), 0x0, 0x0) 15:01:10 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a02000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 15:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) socket$inet_tcp(0x2, 0x1, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x480040, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000080)={0x2, @broadcast}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:11 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40), 0x0, 0x0) 15:01:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a4c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:11 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:11 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f0000000440)) 15:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086610, &(0x7f00000000c0)={0x7ff00}) 15:01:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ppp0[\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000001c0)={@dev, 0x0}, &(0x7f0000000200)=0x14) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000300)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f0000000700)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x84000202}, 0xc, &(0x7f00000006c0)={&(0x7f0000000480)=@polexpire={0x220, 0x1b, 0x200, 0x70bd29, 0x25dfdbfc, {{{@in=@multicast2, @in=@local, 0x4e22, 0x9, 0x4e23, 0x0, 0xa, 0x20, 0x80, 0xc, r3, r4}, {0xb67, 0x6, 0x7fffffff, 0x0, 0x1000, 0xfffffffffffffff7, 0xffffffffffffff55, 0xffff}, {0x1, 0x2, 0x0, 0x4}, 0x0, 0x6e6bc0, 0x1, 0x0, 0x3, 0x2}, 0x5}, [@user_kmaddress={0x2c, 0x13, {@in=@dev={0xac, 0x14, 0x14, 0xd}, @in6=@local, 0x0, 0xa}}, @replay_thresh={0x8, 0xb, 0x3}, @replay_esn_val={0x24, 0x17, {0x2, 0x70bd2d, 0x70bd2d, 0x70bd2c, 0x70bd2a, 0x6, [0x80000001, 0x2]}}, @sa={0xe4, 0x6, {{@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0x1c}, 0x4e24, 0x8000, 0x4e22, 0xffffffffffffffff, 0x2, 0x20, 0x80, 0x2b, r5, r6}, {@in6=@dev={0xfe, 0x80, [], 0x18}, 0x4d2, 0xff}, @in6, {0xffffffffffff7fff, 0x78d2, 0x34, 0x1, 0x2, 0xce, 0x10000, 0x5ff7c9a6}, {0x3, 0x4, 0x7fffffff, 0xfffffffffffffff7}, {0x5, 0x6, 0x7}, 0x70bd28, 0x3504, 0xa, 0x0, 0x3, 0x10}}, @replay_thresh={0x8}, @encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e23, 0x4e20}}]}, 0x220}, 0x1, 0x0, 0x0, 0x1}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffe000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:11 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000680)={0x14, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x7592da67}}, 0x14}}, 0x0) 15:01:11 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40), 0x0, 0x0) 15:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) [ 406.241412] audit: type=1326 audit(1536246071.598:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22705 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000001f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:11 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:11 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 15:01:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100, 0x200080) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000080)) [ 406.443132] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 15:01:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='dax\x00', 0x0, 0x0) 15:01:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:12 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/185, 0xb9) 15:01:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:12 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) fdatasync(0xffffffffffffffff) 15:01:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x77b12c04, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:12 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000009e90000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:12 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x40000000000e900, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb2c906d6b66732e666174000404010a02000274f1f8", 0x16}], 0x0, &(0x7f0000000240)={[{@fat=@gid={'gid'}}]}) 15:01:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="153f6234488dd25dac5448") connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100b71240e939553b840da1da0000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) pwrite64(0xffffffffffffffff, &(0x7f0000000040)="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", 0xff, 0x0) [ 407.026405] audit: type=1326 audit(1536246072.381:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22836 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:12 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff, @mcast2}, 0x1c) 15:01:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000020000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:12 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000500)) 15:01:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup(r0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000040)=0x32b9) 15:01:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:12 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000180), &(0x7f00000001c0)="b5", 0x1, 0xfffffffffffffffc) 15:01:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0605345, &(0x7f00000000c0)={0x0, @time}) 15:01:12 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000500)) 15:01:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 15:01:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000090000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x19e, &(0x7f00000000c0)="150200000000c3411a48416f130000006070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$notify(r0, 0x402, 0x2) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:13 executing program 7: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000005c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) [ 407.667254] audit: type=1326 audit(1536246073.023:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22920 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001280)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cfb(twofish-asm),ghash-clmulni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 15:01:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000480000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:13 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x0, 0x0, 0x0) 15:01:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:13 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setrlimit(0xf, &(0x7f0000000040)={0x9, 0x11}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$inet6_buf(r2, 0x29, 0xff, &(0x7f0000000100)="4c3e3e9bea746aa269", 0x9) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000002600000000000001e000000180000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x4400, 0x0) ioctl$NBD_DISCONNECT(r3, 0xab08) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:13 executing program 7: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000008dc0)='./file1\x00') lseek(r0, 0x0, 0x3) 15:01:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:13 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x0, 0x0, 0x0) 15:01:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000001f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xc, 0x10, r1, 0x7) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = fcntl$getown(r1, 0x9) ptrace$setsig(0x4203, r3, 0x400, &(0x7f0000000080)={0x1, 0x81, 0xffff, 0x5}) r4 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xe46, 0x400000) ioctl$KVM_GET_TSC_KHZ(r4, 0xaea3) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x2000) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x50, {{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x19}, 0x100000000}}}, 0x88) 15:01:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:13 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f0000000400), 0x8) [ 408.467186] audit: type=1326 audit(1536246073.824:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22920 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) 15:01:14 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x0, 0x0, 0x0) 15:01:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000002000001e000000100000000000000000000000000090000ea541d3d73056c23d21c619b6cef5496000000000a000000000000001a92a4b9f0d77349fbb64127e2e7d1895d51b8373831a855a0df3751315c8a6be8d73db0c182b8fc0000a70000000020df284fe4d062354c67dcb8f38faba959daff126e0ecce77663b0debd978ef43cbe4faccafa2b1b30ac2477379a7435383d6a8ac580f05900", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r0, r2) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f00000000c0)) 15:01:14 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 15:01:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x4040, 0x0) [ 408.885364] audit: type=1326 audit(1536246074.242:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23036 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:14 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x150, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r0, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 15:01:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:14 executing program 6: epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) dup2(r0, r1) getpeername(r1, &(0x7f0000000240)=@hci, &(0x7f0000000040)=0x80) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in=@rand_addr, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in6=@ipv4}, 0x0, @in6=@dev, 0x0, 0x7, 0x3}}, 0xe8) 15:01:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0xfffffffbbfffffff, 0x6, 0x0, @buffer={0x0, 0xe9, &(0x7f0000000080)=""/233}, &(0x7f00000002c0)="9b247f9c1793", &(0x7f0000000240)=""/126, 0x0, 0x0, 0x0, &(0x7f0000000480)}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/42, 0xf0) 15:01:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:14 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)="12218913c60000000000", 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 15:01:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000040)={0x87, @broadcast, 0x4e20, 0x3, 'sh\x00', 0x2, 0x1, 0x75}, 0x2c) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="b8000000190001000008d9f348da9cf7ebcbc5fcdc9461000000000000000000000001e00000019a51e7185847db7b84d2ae5000002100000000000000000000000400000000000a0000000000000000000000000000000000f217920beca7e5b3465576c18aed84fc38613a6ef955c2746baad09234905cffcdb600ae0181beb781880d0aa656028f7a2013fc434058f7143f2da6dfcb33afa0f1c409d113463fdbd150df4da44acde8e34282d05a1256ebfdbe0ccb2acbf9b43a0179ae0313f66ae0b7847bf54a9ad8db3dae501c667ff76da9fb5d5d555c6bc66135ff8c07b8b49d7cc78a87fcf704dc49d8337b04654e8e192d441ae9d2605097afa3988e9e7bcf4977737d51ed78c2f59dcf64", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00480000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:14 executing program 7: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 15:01:14 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) writev(0xffffffffffffffff, &(0x7f00000001c0), 0x0) [ 409.477973] audit: type=1326 audit(1536246074.826:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23098 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 [ 409.569190] audit: type=1326 audit(1536246074.864:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23100 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000f7a000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000040000)) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, &(0x7f0000f28ff8), 0x100000002) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) r2 = getpgid(0x0) tkill(r2, 0x13) 15:01:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) accept$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x718f, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f00000000c0)) 15:01:15 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000006c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 409.661532] audit: type=1326 audit(1536246075.018:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23036 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:15 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffdfc0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:15 executing program 1: r0 = socket$inet6(0xa, 0x1002000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x60000, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x101904, 0x0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000000c0)=0xfffffffffffffff9) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) 15:01:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:15 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 410.039355] Unknown ioctl -2144293252 [ 410.104037] Unknown ioctl -2144293252 15:01:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffdfd0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:15 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) [ 410.259321] audit: type=1326 audit(1536246075.616:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23098 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:15 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000280)=""/228, &(0x7f0000000080)=0x18) 15:01:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000200)) 15:01:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000f7a000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000040000)) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, &(0x7f0000f28ff8), 0x100000002) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) r2 = getpgid(0x0) tkill(r2, 0x13) 15:01:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x10000, 0x0) read$FUSE(r3, &(0x7f0000000300), 0x1000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_flowlabel\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000080)) 15:01:15 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 410.370552] audit: type=1326 audit(1536246075.662:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23100 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457099 code=0xffff0000 15:01:15 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a07000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:15 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 15:01:15 executing program 7: epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) 15:01:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x893, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:15 executing program 5: 15:01:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a23000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:16 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:16 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 15:01:16 executing program 5: 15:01:16 executing program 7: 15:01:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000080)=0x3) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) 15:01:16 executing program 0: 15:01:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afdffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:16 executing program 5: 15:01:16 executing program 7: 15:01:16 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080), 0x0) 15:01:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000001fa0bccb2a0dfbad33feff16572ef90000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:16 executing program 5: 15:01:16 executing program 7: 15:01:16 executing program 0: 15:01:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363af4ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:16 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080), 0x0) 15:01:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:16 executing program 5: 15:01:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000000040)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:16 executing program 7: 15:01:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0007ffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:17 executing program 0: 15:01:17 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080), 0x0) 15:01:17 executing program 5: 15:01:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 15:01:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x5c6e) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000140)=0xfd65) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={@loopback, 0x7c, r1}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x16) 15:01:17 executing program 7: 15:01:17 executing program 3: 15:01:17 executing program 0: 15:01:17 executing program 7: 15:01:17 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:17 executing program 5: 15:01:17 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'tunl0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000200)={r4, @broadcast, @local}, 0xc) 15:01:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a68000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:17 executing program 5: 15:01:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:17 executing program 0: 15:01:17 executing program 7: 15:01:17 executing program 3: 15:01:17 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a05000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r2}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0xb86, 0xa, [0x3, 0x3, 0x9, 0x4, 0x8, 0x0, 0x7, 0x0, 0x7, 0xa9c]}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r4, 0x100000000}, &(0x7f0000000140)=0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:17 executing program 5: 15:01:17 executing program 0: 15:01:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:17 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/28, 0x27c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0xc1}) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc05c5340, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc0305302, &(0x7f0000000000)) 15:01:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000068000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000004e9fdcfcf7436247de00000000000000000000000000000000000000000002400000e4ffffff00000000000000000000000000000000000000000000000000000000005f2a00000000000000000000000000400000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:17 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:17 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) 15:01:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 412.468967] hfs: can't find a HFS filesystem on dev loop3 15:01:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f00000000c0)={0x43ff}) [ 412.606772] hfs: can't find a HFS filesystem on dev loop3 [ 412.653862] EXT4-fs (sda1): resizing filesystem from 524032 to 17407 blocks [ 412.661235] EXT4-fs warning (device sda1): ext4_resize_fs:1929: can't shrink FS - resize aborted 15:01:18 executing program 6: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f00000000c0)={0x7ff00}) 15:01:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getpeername$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @remote}, 0x10) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f00000000c0)={0x43ff}) [ 412.824043] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 15:01:18 executing program 6: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 412.909245] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 15:01:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f00000000c0)={0x7ff00}) 15:01:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 413.002614] hfs: can't find a HFS filesystem on dev loop3 [ 413.033487] EXT4-fs (sda1): resizing filesystem from 524032 to 17407 blocks [ 413.040716] EXT4-fs warning (device sda1): ext4_resize_fs:1929: can't shrink FS - resize aborted [ 413.205335] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 15:01:18 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x400445a0, &(0x7f0000013000)) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000013000/0x1000)=nil, 0x1000}) shmget$private(0x0, 0xf000, 0x54000400, &(0x7f0000005000/0xf000)=nil) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000880)=""/155) close(r0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 15:01:18 executing program 6: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f1d306c9f0d40860901947d5c312e6a4c5949056bac1958887eb6633e39ca33a3544cfba6e4a4a4fbfcb122f865def9ba5850bb6ae79820a91c780b4bc9f762ee3fc17e799f460040000b2b4996bc2ebb20b2c3c95514ff85b07c67af53e176851"], 0xb8}}, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)="ed097839d08bd05972f28e20d0e13002d022a60aaacf17ab959a6145ad36030c93db6f3283558a89730643c49e8f8b06c0b74699481d84f3814864f648e1eff2f3064ab434d3a45e7316509dd39e", 0x4e) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035f", 0x6b, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f00000000c0)={0x7ff00}) 15:01:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 413.403993] hfs: can't find a HFS filesystem on dev loop3 15:01:18 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 413.474621] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks [ 413.514175] FAULT_FLAG_ALLOW_RETRY missing 30 [ 413.518919] CPU: 0 PID: 23477 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 413.527419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.536779] Call Trace: [ 413.539442] dump_stack+0x1c9/0x2b4 [ 413.543092] ? dump_stack_print_info.cold.2+0x52/0x52 [ 413.548314] ? kasan_check_write+0x14/0x20 [ 413.552554] ? do_raw_spin_lock+0xc1/0x200 [ 413.556799] handle_userfault.cold.33+0x43/0x52 [ 413.561511] ? userfaultfd_ioctl+0x5420/0x5420 [ 413.566117] ? mark_held_locks+0x160/0x160 15:01:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000ffffff970000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$inet(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10) ioctl(r0, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") msgget$private(0x0, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000000c0)={0x8, 0x1, 0x0, 0x80, 0x7}, 0xc) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x10000) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000080)=0x4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000001000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRESHEX=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000eaffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x4000) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f00000001c0)) 15:01:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 413.570392] ? perf_event_update_userpage+0xd30/0xd30 [ 413.575599] ? print_usage_bug+0xc0/0xc0 [ 413.579680] ? print_usage_bug+0xc0/0xc0 [ 413.583734] ? __perf_event_task_sched_in+0x24f/0xbb0 [ 413.588927] ? perf_trace_lock+0xde/0x920 [ 413.593088] ? userfaultfd_ctx_put+0x810/0x810 [ 413.597666] ? find_held_lock+0x36/0x1c0 [ 413.601725] ? __lock_acquire+0x7fc/0x5020 [ 413.605966] ? graph_lock+0x170/0x170 [ 413.609778] ? find_held_lock+0x36/0x1c0 [ 413.613854] ? lock_downgrade+0x8f0/0x8f0 [ 413.618033] ? kasan_check_read+0x11/0x20 [ 413.622181] ? do_raw_spin_unlock+0xa7/0x2f0 [ 413.626577] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 413.631155] ? kasan_check_write+0x14/0x20 [ 413.635406] ? do_raw_spin_lock+0xc1/0x200 [ 413.639681] __handle_mm_fault+0x389e/0x4350 [ 413.644123] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 413.648999] ? graph_lock+0x170/0x170 [ 413.652799] ? lock_downgrade+0x8f0/0x8f0 [ 413.656937] ? handle_mm_fault+0x8c4/0xc80 [ 413.661197] ? handle_mm_fault+0x8c4/0xc80 [ 413.665442] ? kasan_check_read+0x11/0x20 [ 413.669583] ? rcu_is_watching+0x8c/0x150 [ 413.673722] ? __do_page_fault+0x620/0xe50 [ 413.677958] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 413.682655] handle_mm_fault+0x53e/0xc80 [ 413.686767] ? __handle_mm_fault+0x4350/0x4350 [ 413.691370] ? find_vma+0x34/0x190 [ 413.694926] __do_page_fault+0x620/0xe50 [ 413.699006] ? mm_fault_error+0x380/0x380 [ 413.703159] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 413.708170] ? graph_lock+0x170/0x170 [ 413.711964] do_page_fault+0xf6/0x7a4 [ 413.715768] ? vmalloc_sync_all+0x30/0x30 [ 413.719941] ? error_entry+0x76/0xd0 [ 413.723661] ? trace_hardirqs_off_caller+0xbb/0x2b0 [ 413.728683] ? find_held_lock+0x36/0x1c0 [ 413.732749] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.737580] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 413.742603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.747466] page_fault+0x1e/0x30 [ 413.750923] RIP: 0010:copy_user_generic_unrolled+0x9e/0xc0 [ 413.756550] Code: 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 <8a> 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f [ 413.775447] RSP: 0018:ffff880188b0f7f0 EFLAGS: 00010202 [ 413.780822] RAX: 0000000000000004 RBX: 0000000000000004 RCX: 0000000000000004 [ 413.788092] RDX: 0000000000000004 RSI: 0000000020013000 RDI: ffff880188b0f890 [ 413.795347] RBP: ffff880188b0f828 R08: ffffed0031161f13 R09: ffffed0031161f12 [ 413.802614] R10: ffffed0031161f12 R11: 0000000000000003 R12: 0000000020013004 [ 413.809893] R13: 0000000020013000 R14: ffff880188b0f890 R15: 00007ffffffff000 [ 413.817200] ? _copy_from_user+0x10d/0x150 [ 413.821452] evdev_do_ioctl+0xb69/0x2190 [ 413.825507] ? str_to_user+0x90/0x90 [ 413.829207] ? graph_lock+0x170/0x170 [ 413.833001] ? do_futex+0x249/0x27d0 [ 413.836716] ? rcu_is_watching+0x8c/0x150 [ 413.840866] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 413.845626] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 413.850286] ? zap_class+0x740/0x740 [ 413.853998] ? find_held_lock+0x36/0x1c0 [ 413.858056] ? lock_downgrade+0x8f0/0x8f0 [ 413.862215] ? rcu_is_watching+0x8c/0x150 [ 413.866362] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 413.871032] ? __fget+0x4d5/0x740 [ 413.874478] ? ksys_dup3+0x690/0x690 [ 413.878185] ? trace_hardirqs_on+0x2c0/0x2c0 [ 413.882597] evdev_ioctl_handler+0x144/0x1a0 [ 413.887011] evdev_ioctl+0x27/0x2e [ 413.890553] ? evdev_ioctl_compat+0x30/0x30 [ 413.894889] do_vfs_ioctl+0x1de/0x1720 [ 413.898787] ? kasan_check_read+0x11/0x20 [ 413.902939] ? rcu_is_watching+0x8c/0x150 [ 413.907177] ? trace_hardirqs_on+0xbd/0x2c0 [ 413.911489] ? ioctl_preallocate+0x300/0x300 [ 413.915901] ? __fget_light+0x2f7/0x440 [ 413.919876] ? putname+0xf2/0x130 [ 413.923332] ? fget_raw+0x20/0x20 [ 413.926791] ? rcu_read_lock_sched_held+0x108/0x120 [ 413.931806] ? __x64_sys_futex+0x47f/0x6a0 [ 413.936052] ? do_syscall_64+0x9a/0x820 [ 413.940029] ? do_syscall_64+0x9a/0x820 [ 413.944002] ? lockdep_hardirqs_on+0x421/0x5c0 [ 413.948621] ? security_file_ioctl+0x94/0xc0 [ 413.953037] ksys_ioctl+0xa9/0xd0 [ 413.956484] __x64_sys_ioctl+0x73/0xb0 [ 413.960407] do_syscall_64+0x1b9/0x820 [ 413.964297] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 413.969693] ? syscall_return_slowpath+0x5e0/0x5e0 [ 413.974618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.979489] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 413.984498] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 413.989520] ? prepare_exit_to_usermode+0x291/0x3b0 [ 413.994529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.999372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.004561] RIP: 0033:0x457099 [ 414.007742] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.026628] RSP: 002b:00007fbec30dfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 414.034334] RAX: ffffffffffffffda RBX: 00007fbec30e06d4 RCX: 0000000000457099 [ 414.041600] RDX: 0000000020013000 RSI: 00000000400445a0 RDI: 0000000000000004 [ 414.048856] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 414.056135] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 414.063405] R13: 00000000004ce800 R14: 00000000004c4d57 R15: 0000000000000000 15:01:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:19 executing program 5: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 414.239045] hfs: can't find a HFS filesystem on dev loop3 15:01:19 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000ff010000000000004000000000000001e00000010000000000c500000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 414.431578] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 414.475797] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:19 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 414.662039] hfs: can't find a HFS filesystem on dev loop3 15:01:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="2c48a4cd00000000000000000000000000000000000000000000000000000000070000000000000000000b4a513008efb068aaf60000000000000000000000000000000000000018670000000000000000000000000000000000004a9457759610c5012236e2ee05af23c08fd48b1419a436dd5a171c95fac2aae5c0d6861978b0be2fd2c10326c51bfb93d3c47b38efdd2f93e5a25e9c16e67260ba03d7f7eb9dc5332836c4120046d4eaa421112516ba72245c678bf36f71cafb3450a0d86474038493fc780468912c0b1d35e9f00483d72b70ee866213c300000000000000000000"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:20 executing program 5: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:20 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 414.940539] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 414.971216] hfs: can't find a HFS filesystem on dev loop3 [ 414.991151] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a007a0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="43000000132b779516010069e64ad5dc825d947f9422f071281c30d1c00000e20963b61337e1a9942147186ca51f5a919970d242d175e0ac3950b7eb8740d0edcfea629140f10b5d0f2789c4a351e1b6c58577fc4a7d0dcc23dbead6cdb8f7dec46cd3d6"], &(0x7f00000000c0)=0x4b) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r1, 0x10000, 0x30, 0x1, 0x1314}, &(0x7f0000000140)=0x18) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r3, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000020bc8b91b9f54ef56939207091c7361e5014f0bd3b612888a52f65ffac0977b9143f61e5fac9670cc19f009e30bdbc7980bb6c8146aabd8e431fa9e579adc34b4e131cd9baec60ed254673"], 0xb8}}, 0x0) r5 = getpgrp(0x0) rt_tgsigqueueinfo(r5, r5, 0x30, &(0x7f0000000240)={0x12, 0x8, 0x4}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000200)=r5) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:20 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:20 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080), 0x0) 15:01:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000006c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 415.353058] hfs: can't find a HFS filesystem on dev loop3 15:01:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/16) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000080)=@routing={0x4, 0xe, 0x2, 0x1, 0x0, [@loopback, @dev={0xfe, 0x80, [], 0x10}, @loopback, @loopback, @remote, @loopback, @local]}, 0x78) [ 415.431669] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 415.436662] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 415.635279] hfs: can't find a HFS filesystem on dev loop3 15:01:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a97ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:21 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080), 0x0) 15:01:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b800150e800254354e738e0a080000030001000000000000000000ff010000000000000000000000000001e0000001000000000000000000001300b1f3708b0ebdf3000000000004000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xfffffffffffffffe, 0x1000000007, @remote, 0x4739955}, 0x1c) r3 = accept(r0, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000001c0)={@vsock={0x28, 0x0, 0xffffffff}, {&(0x7f0000000100)=""/65, 0x41}, &(0x7f0000000180), 0x4}, 0xa0) 15:01:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2010000000000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 415.953615] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 415.981829] hfs: can't find a HFS filesystem on dev loop3 [ 415.991405] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:21 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080), 0x0) 15:01:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000c0ed00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:21 executing program 5: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7ff, 0x400) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000180)={'security\x00', 0x73, "2dc393fa3ed9bb8e2d2d8d94490fa752da6c033dada3fbee1750ef0fe2eb0aef2708d52ec2f003a64b1920581767e3a46843f88f68a33d528df10b9be374ed3dd4ff11b19909359bc887f7acbc248cee27ca08182f0aa8715091b901e16fee27fff6a2c62ee4779b6c2b82e6fa74b2968a504a"}, &(0x7f0000000240)=0x97) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:21 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 416.326002] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 416.390524] hfs: can't find a HFS filesystem on dev loop3 [ 416.403290] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:21 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 15:01:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:22 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 416.717515] hfs: can't find a HFS filesystem on dev loop3 [ 416.741919] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 416.770398] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6_udp(0xa, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a10200000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:22 executing program 6: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:01:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe9090000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 417.207331] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 417.222740] print_req_error: I/O error, dev loop0, sector 128 [ 417.229425] hfs: can't find a HFS filesystem on dev loop3 15:01:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 417.253003] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363affffffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 417.539005] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 417.573172] hfs: can't find a HFS filesystem on dev loop3 [ 417.581360] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000ffffff8c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100100, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 15:01:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:23 executing program 5: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x10000, 0x1, &(0x7f0000001340)=[{&(0x7f0000000340)="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", 0x1000, 0xfff}], 0x40000, &(0x7f0000001380)={[{@check_relaxed='check=relaxed'}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, &(0x7f0000000180), 0x100000002) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e21}, @in6={0xa, 0x4e22, 0x7, @remote, 0x8}], 0x4c) accept4$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c, 0x80000) 15:01:23 executing program 6: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:23 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a001f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x74, &(0x7f0000000240)) 15:01:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x1) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xfffffffffffffffe, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000080)="3e0d2411c5cc9514ae18e9c1f67d45b1287530cae3e58d9d9091d96124e929e8c0bb3be549359bbaf255f6f2ff13fe6c7b1e19ab27a07daf461be9630fc4a3551781d54f7f0f085a44c3a4187a20ebb34c75412d13da80f7e69b278d9992ace1991fe388d7e9e5a65dc92c1664ac8e50b981d59ae9"}, {&(0x7f00000002c0)="4ab199179bca14043543de8495c8d9e95f4b967a6cb982f361af616bb69bf7e22af772927d27961bf5778321caad17ae2a312a53bc458c65da9d2cc354a93fea41f1f1564f2f50e5e14ea3ad0c7445f3f82b35470067dcf2842743421083e00357e435edc433062cdf0942217e2ba3bf06f5450f8bacddf73c0228010ce69af5e210a01c5d5ab5d63f3a333b180758b11ecec9b10ec75f447de46d48816d268e86fa5b1f1a4a88f998"}, {&(0x7f0000000240)="276d5176086d157b4af55ccd52e675ed471a373d290f1f2945dc90c8fad9b6272779ed97f749ff03d3bb0aeac8d180a0ea4f01de"}, {&(0x7f0000000140)="ebe65e9f5a3e"}, {&(0x7f00000004c0)="ea13f06212a400271184e57d38c3971a7d5d38c3cc661f68611e7aec6f1d4fbdfedf737d07c6bbc61a0d43fc130f90a5404eb3a31e53ca1e505ba10fd4aa0c93397e211d4a0000f652238e4b9ac591d0fc831a89e7ec8dfcae27d78449aff06b8f900cc7d35f792f5488bc224ccf0e53e3101d1618e15c1cdea38e3cd0d33b6f", 0xfea0}], 0xbc) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000200)) sendfile(r0, r0, &(0x7f0000000100), 0x3) [ 418.205235] hfs: can't find a HFS filesystem on dev loop3 [ 418.218782] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 418.287374] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a09000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4000000000000000, &(0x7f0000000240)) 15:01:23 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:24 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 418.599391] hfs: can't find a HFS filesystem on dev loop3 15:01:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a10000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 418.697490] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 418.742353] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:24 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:24 executing program 6: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x1a4bff06, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffc00, 0x3, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0xbb, 0x1, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x8, 0x7, 0x0, 0x3, 0x8, 0x3, 0x5935}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r1, 0x409, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x2800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000003c0)={0x7, 0x8}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x10000, @mcast1, 0x7}, 0x1c) sendmmsg(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 15:01:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x97ffffff, &(0x7f0000000240)) 15:01:24 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363affffff8c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x20000004e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x59aa, 0x4) recvmmsg(r0, &(0x7f0000004400)=[{{&(0x7f0000001180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=""/255, 0xff}}], 0x1, 0x0, &(0x7f00000045c0)={0x77359400}) syz_emit_ethernet(0x437, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000001780)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000140)=0x30) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000002c0)=""/166) recvmmsg(0xffffffffffffffff, &(0x7f0000001680), 0x0, 0x0, &(0x7f0000002800)) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) [ 419.154476] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 419.164410] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20000000, &(0x7f0000000240)) 15:01:25 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:25 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x20000004e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x59aa, 0x4) recvmmsg(r0, &(0x7f0000004400)=[{{&(0x7f0000001180)=@pppol2tp, 0x80, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=""/255, 0xff}}], 0x1, 0x0, &(0x7f00000045c0)={0x77359400}) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) recvmmsg(0xffffffffffffffff, &(0x7f0000001680), 0x0, 0x0, &(0x7f0000002800)) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 15:01:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 419.727058] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 419.753919] print_req_error: I/O error, dev loop0, sector 128 [ 419.756050] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:25 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffdfc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2010, &(0x7f0000000240)) 15:01:25 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) write$P9_RWALK(r0, &(0x7f0000000040)={0x30, 0x6f, 0x2, {0x3, [{0x12, 0x3}, {0x4, 0x2, 0x1}, {0xc, 0x0, 0x6}]}}, 0x30) 15:01:25 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=""/244, 0xf4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:25 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 420.175353] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 420.235224] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfffffdfc, &(0x7f0000000240)) 15:01:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=""/244, 0xf4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:25 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:25 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00740000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xffffff8c, &(0x7f0000000240)) 15:01:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000140)=0x54) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x20000004e20, 0x0, @dev={0xfe, 0x80, [], 0x1e}}, 0x1c) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x18) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x59aa, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{&(0x7f0000000300)=@generic, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000380)=""/47}, {&(0x7f00000003c0)=""/127}, {&(0x7f0000000440)=""/252}, {&(0x7f0000000540)=""/167}, {&(0x7f0000004200)=""/88}, {&(0x7f0000000680)=""/39}], 0x0, &(0x7f00000006c0)=""/29}, 0x80000001}, {{&(0x7f0000004300)=@nl, 0x150, &(0x7f0000000e40)=[{&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/166}, {&(0x7f00000017c0)=""/4096}, {&(0x7f0000000d40)=""/78}, {&(0x7f0000000dc0)=""/73}], 0x0, &(0x7f0000000ec0), 0x0, 0xd2}, 0x5}, {{&(0x7f0000000f00)=@llc, 0x0, &(0x7f0000001280)=[{&(0x7f0000000f80)=""/127}, {&(0x7f0000001000)=""/51}, {&(0x7f0000001040)=""/106}, {&(0x7f00000010c0)=""/115}, {&(0x7f0000001200)=""/84}, {&(0x7f0000002840)=""/4096}, {&(0x7f0000001400)=""/206}, {&(0x7f0000001140)=""/19}], 0x0, &(0x7f0000001500)=""/169, 0x0, 0x8000}, 0x7fffffff}, {{&(0x7f0000004280)=@xdp, 0x0, &(0x7f00000027c0)=[{&(0x7f0000001640)=""/65}, {&(0x7f00000016c0)=""/75}, {&(0x7f0000003840)=""/139}, {&(0x7f0000001740)=""/20}], 0x0, &(0x7f0000003900)=""/68}, 0x6000000000000}, {{&(0x7f0000003980)=@alg, 0x0, &(0x7f0000003f80)=[{&(0x7f0000003a00)=""/55, 0xffffffffffffff79}, {&(0x7f0000003a40)=""/75}, {&(0x7f0000003ac0)=""/158}, {&(0x7f0000003b80)=""/161}, {&(0x7f0000004600)=""/4096}, {&(0x7f0000003c40)=""/250}, {&(0x7f0000003d40)=""/26}, {&(0x7f0000003d80)=""/112}, {&(0x7f0000003e00)=""/232}, {&(0x7f0000003f00)=""/120}], 0x0, &(0x7f0000004040)=""/70, 0x0, 0x8001}, 0xfd}], 0x4000000000002fc, 0x400000000000000, &(0x7f00000045c0)={0x77359400}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000180)={0x3, 0x1000000000}) syz_emit_ethernet(0x437, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000001780)) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000200)=""/129, &(0x7f00000002c0)=0x81) recvmmsg(0xffffffffffffffff, &(0x7f0000001680), 0x0, 0x0, &(0x7f0000002800)) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 15:01:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3da, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70b877b3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) [ 420.628845] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000240)) [ 420.663447] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:26 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:26 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=""/244, 0xf4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363af5ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x600000000000000, &(0x7f0000000240)) 15:01:26 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:26 executing program 3: r0 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@vsock, &(0x7f0000000040)=0x80, 0x80800) accept4$unix(r0, &(0x7f00000002c0), &(0x7f0000000140)=0x6e, 0x800) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$alg(0x26, 0x5, 0x0) r3 = accept$alg(r2, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000240)=0x5) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$KDENABIO(r1, 0x4b36) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) rmdir(&(0x7f00000000c0)='./file0\x00') r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:01:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:26 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=""/244, 0xf4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:01:26 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 421.082437] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x8cffffff00000000, &(0x7f0000000240)) [ 421.125411] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363ae9090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:26 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=""/244, 0xf4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:01:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000100), &(0x7f0000000140)={0x9}, 0x8) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x410000) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) socketpair(0xf, 0x0, 0x4cc, &(0x7f0000000240)) 15:01:26 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4000000, &(0x7f0000000240)) 15:01:26 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00feffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:26 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=""/244, 0xf4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) [ 421.696586] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 421.715586] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7a00, &(0x7f0000000240)) 15:01:27 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00004b5000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) read(r4, &(0x7f0000000280)=""/100, 0x64) read(r3, &(0x7f0000000400)=""/100, 0x64) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x600) 15:01:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000050000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:27 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:27 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:27 executing program 5: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000140)={@my=0x0}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x88001, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, &(0x7f0000000000)={0x0, r1}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x8002, &(0x7f00000000c0)=0xb0f4, 0xa) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:01:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:27 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6c, &(0x7f0000000240)) [ 422.189766] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7a000000, &(0x7f0000000240)) [ 422.232589] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:27 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:27 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000200000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x8) 15:01:27 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:27 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6c000000, &(0x7f0000000240)) 15:01:27 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a7fffffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 422.602612] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 422.631526] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 423.084290] Restarting kernel threads ... done. 15:01:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7ffff000}], 0x1) 15:01:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x9) 15:01:28 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x215e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6800000000000000, &(0x7f0000000240)) 15:01:28 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0fff0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) [ 423.191446] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 423.229450] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:28 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x20000207}], 0x1) 15:01:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xffffffff00000000, &(0x7f0000000240)) 15:01:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:28 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7ffff000}], 0x1) 15:01:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0908f5000319", 0x7}], 0x1) 15:01:28 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 423.492631] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 423.563218] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a04000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x700000000000000, &(0x7f0000000240)) 15:01:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7ffff000}], 0x1) 15:01:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:29 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:29 executing program 3 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 423.886424] FAULT_INJECTION: forcing a failure. [ 423.886424] name failslab, interval 1, probability 0, space 0, times 0 [ 423.897789] CPU: 0 PID: 24466 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 423.906303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.915686] Call Trace: [ 423.918353] dump_stack+0x1c9/0x2b4 [ 423.922032] ? dump_stack_print_info.cold.2+0x52/0x52 [ 423.927259] ? perf_trace_lock+0x49d/0x920 [ 423.931564] should_fail.cold.4+0xa/0x11 [ 423.935679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.940851] ? proc_fail_nth_write+0x9e/0x210 [ 423.945412] ? find_held_lock+0x36/0x1c0 [ 423.949552] ? check_same_owner+0x340/0x340 [ 423.954150] ? rcu_note_context_switch+0x680/0x680 [ 423.959129] __should_failslab+0x124/0x180 [ 423.963447] should_failslab+0x9/0x14 [ 423.967292] __kmalloc+0x2b2/0x720 [ 423.970865] ? strncpy_from_user+0x510/0x510 [ 423.975306] ? fput+0x130/0x1a0 [ 423.978619] ? do_syscall_64+0x9a/0x820 [ 423.982636] ? __x64_sys_memfd_create+0x142/0x4f0 [ 423.987520] ? do_syscall_64+0x9a/0x820 [ 423.991540] __x64_sys_memfd_create+0x142/0x4f0 [ 423.996254] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 424.001822] ? memfd_fcntl+0x1580/0x1580 [ 424.005955] do_syscall_64+0x1b9/0x820 [ 424.009879] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 424.015295] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.020256] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 424.025294] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 424.030324] ? recalc_sigpending_tsk+0x180/0x180 [ 424.035090] ? kasan_check_write+0x14/0x20 [ 424.039348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.044224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.049426] RIP: 0033:0x457099 [ 424.052634] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.071555] RSP: 002b:00007f947c557a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 424.079296] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457099 15:01:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a6c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x97ffffff00000000, &(0x7f0000000240)) [ 424.086587] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 424.094472] RBP: 00000000009300a0 R08: 0000000000000000 R09: 00000000fbad8001 [ 424.101747] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000004 [ 424.109024] R13: 00000000004d7218 R14: 00000000004ca2b7 R15: 0000000000000000 [ 424.124533] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:29 executing program 5 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 424.146495] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:29 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280), 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 15:01:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 424.306576] FAULT_INJECTION: forcing a failure. [ 424.306576] name failslab, interval 1, probability 0, space 0, times 0 [ 424.318138] CPU: 0 PID: 24490 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 424.326670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.336046] Call Trace: [ 424.338712] dump_stack+0x1c9/0x2b4 [ 424.342376] ? dump_stack_print_info.cold.2+0x52/0x52 [ 424.347616] ? perf_trace_lock+0x49d/0x920 [ 424.351932] should_fail.cold.4+0xa/0x11 [ 424.356042] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.361172] ? __lock_acquire+0x7fc/0x5020 [ 424.365444] ? find_held_lock+0x36/0x1c0 [ 424.369559] ? graph_lock+0x170/0x170 [ 424.373403] ? mark_held_locks+0x160/0x160 [ 424.377685] ? find_held_lock+0x36/0x1c0 [ 424.381788] ? __lock_is_held+0xb5/0x140 [ 424.385926] ? check_same_owner+0x340/0x340 [ 424.390308] ? aa_path_link+0x4e0/0x4e0 [ 424.394328] ? rcu_note_context_switch+0x680/0x680 [ 424.399303] __should_failslab+0x124/0x180 [ 424.403590] should_failslab+0x9/0x14 [ 424.407432] __kmalloc+0x2b2/0x720 [ 424.411001] ? graph_lock+0x170/0x170 [ 424.414845] ? kernfs_fop_write+0x33d/0x480 [ 424.419226] kernfs_fop_write+0x33d/0x480 [ 424.423439] __vfs_write+0x117/0x9d0 [ 424.427188] ? kernfs_fop_open+0x1020/0x1020 [ 424.431656] ? kernel_read+0x120/0x120 [ 424.435585] ? __lock_is_held+0xb5/0x140 [ 424.439716] ? rcu_read_lock_sched_held+0x108/0x120 [ 424.444776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.450355] ? __sb_start_write+0x17f/0x300 [ 424.454733] vfs_write+0x1fc/0x560 [ 424.458322] ksys_write+0x101/0x260 [ 424.458573] FAULT_INJECTION: forcing a failure. [ 424.458573] name failslab, interval 1, probability 0, space 0, times 0 [ 424.461988] ? __ia32_sys_read+0xb0/0xb0 [ 424.462031] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 424.462083] __x64_sys_write+0x73/0xb0 [ 424.486350] do_syscall_64+0x1b9/0x820 [ 424.490265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 424.495655] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.500607] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 424.505650] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 424.510710] ? recalc_sigpending_tsk+0x180/0x180 [ 424.515487] ? kasan_check_write+0x14/0x20 [ 424.519749] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.524622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.529830] RIP: 0033:0x457099 [ 424.533044] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:01:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xe9090000, &(0x7f0000000240)) 15:01:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:29 executing program 3 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 424.551956] RSP: 002b:00007f11ef176c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 424.559685] RAX: ffffffffffffffda RBX: 00007f11ef1776d4 RCX: 0000000000457099 [ 424.566990] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 424.574268] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 424.581551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 424.588829] R13: 00000000004d82e0 R14: 00000000004cadb1 R15: 0000000000000000 [ 424.596156] CPU: 1 PID: 24502 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 424.604664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.614023] Call Trace: [ 424.616628] dump_stack+0x1c9/0x2b4 [ 424.620281] ? dump_stack_print_info.cold.2+0x52/0x52 [ 424.625509] ? perf_trace_lock+0xde/0x920 [ 424.629684] should_fail.cold.4+0xa/0x11 [ 424.633779] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.638898] ? find_held_lock+0x36/0x1c0 [ 424.642982] ? __lock_acquire+0x7fc/0x5020 [ 424.647230] ? lock_downgrade+0x8f0/0x8f0 [ 424.651435] ? find_held_lock+0x36/0x1c0 15:01:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a231f7dc339e55e1c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 424.655535] ? check_same_owner+0x340/0x340 [ 424.659879] ? rcu_note_context_switch+0x680/0x680 [ 424.664848] ? find_held_lock+0x36/0x1c0 [ 424.668936] __should_failslab+0x124/0x180 [ 424.673208] should_failslab+0x9/0x14 [ 424.677035] kmem_cache_alloc+0x29c/0x710 [ 424.681196] ? lock_downgrade+0x8f0/0x8f0 [ 424.685362] ? shmem_destroy_callback+0xc0/0xc0 [ 424.690056] shmem_alloc_inode+0x1b/0x40 [ 424.694138] alloc_inode+0x63/0x190 [ 424.697792] new_inode_pseudo+0x71/0x1a0 [ 424.701871] ? prune_icache_sb+0x1c0/0x1c0 15:01:30 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280), 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 424.706172] ? _raw_spin_unlock+0x22/0x30 [ 424.710351] new_inode+0x1c/0x40 [ 424.713746] shmem_get_inode+0xf1/0x910 [ 424.717740] ? shmem_encode_fh+0x340/0x340 [ 424.721997] ? lock_downgrade+0x8f0/0x8f0 [ 424.726191] ? lock_release+0x9f0/0x9f0 [ 424.730216] ? check_same_owner+0x340/0x340 [ 424.734556] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 424.739596] ? __check_object_size+0xa3/0x5d7 [ 424.744113] __shmem_file_setup.part.45+0x83/0x2a0 [ 424.749083] shmem_file_setup+0x65/0x90 [ 424.753076] __x64_sys_memfd_create+0x2af/0x4f0 15:01:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 424.757763] ? memfd_fcntl+0x1580/0x1580 [ 424.761857] do_syscall_64+0x1b9/0x820 [ 424.765775] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 424.771165] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.776118] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 424.781167] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 424.786198] ? recalc_sigpending_tsk+0x180/0x180 [ 424.790970] ? kasan_check_write+0x14/0x20 [ 424.795226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.800091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.805310] RIP: 0033:0x457099 15:01:30 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280), 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 424.808536] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.827453] RSP: 002b:00007f947c557a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 424.835186] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457099 [ 424.842465] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 424.849745] RBP: 00000000009300a0 R08: 0000000000000000 R09: 00000000fbad8001 [ 424.857022] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000004 [ 424.864302] R13: 00000000004d7218 R14: 00000000004ca2b7 R15: 0000000000000001 [ 424.879506] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 424.911606] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1f000000, &(0x7f0000000240)) 15:01:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 15:01:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:30 executing program 5 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:30 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 425.233378] FAULT_INJECTION: forcing a failure. [ 425.233378] name failslab, interval 1, probability 0, space 0, times 0 [ 425.244915] CPU: 1 PID: 24554 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 425.253437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.262800] Call Trace: [ 425.265432] dump_stack+0x1c9/0x2b4 [ 425.269081] ? dump_stack_print_info.cold.2+0x52/0x52 [ 425.274298] ? rcu_note_context_switch+0x680/0x680 [ 425.279257] ? perf_trace_lock+0xde/0x920 [ 425.283439] should_fail.cold.4+0xa/0x11 [ 425.287522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.292658] ? mutex_trylock+0x2b0/0x2b0 [ 425.296744] ? graph_lock+0x170/0x170 [ 425.300577] ? __flush_work+0x7d9/0x9c0 [ 425.304575] ? __flush_work+0x7d9/0x9c0 [ 425.308573] ? find_held_lock+0x36/0x1c0 [ 425.312662] ? __lock_is_held+0xb5/0x140 [ 425.316757] ? check_same_owner+0x340/0x340 [ 425.321101] ? rcu_note_context_switch+0x680/0x680 [ 425.326072] __should_failslab+0x124/0x180 [ 425.330322] should_failslab+0x9/0x14 [ 425.334137] __kmalloc_track_caller+0x2ae/0x720 [ 425.338851] ? rcu_is_watching+0x8c/0x150 [ 425.343031] ? alloc_trial_cpuset+0x23/0x110 [ 425.347464] kmemdup+0x24/0x50 [ 425.350680] alloc_trial_cpuset+0x23/0x110 [ 425.354939] cpuset_write_resmask+0x26b/0x30f0 [ 425.359544] ? rcu_note_context_switch+0x680/0x680 [ 425.364506] ? cpuset_css_offline+0xb0/0xb0 [ 425.368846] ? __save_stack_trace+0x8d/0xf0 [ 425.373194] ? kernfs_fop_write+0x204/0x480 [ 425.377546] ? perf_trace_lock+0xde/0x920 15:01:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x300, &(0x7f0000000240)) 15:01:30 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 425.381718] ? mutex_trylock+0x2b0/0x2b0 [ 425.385806] ? save_stack+0xa9/0xd0 [ 425.389469] ? save_stack+0x43/0xd0 [ 425.393123] ? kasan_kmalloc+0xc4/0xe0 [ 425.397028] ? __kmalloc+0x14e/0x720 [ 425.400763] ? kernfs_fop_write+0x33d/0x480 [ 425.405104] ? __vfs_write+0x117/0x9d0 [ 425.409016] ? graph_lock+0x170/0x170 [ 425.412837] ? do_syscall_64+0x1b9/0x820 [ 425.416925] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.422306] ? graph_lock+0x170/0x170 [ 425.426131] ? lock_acquire+0x1e4/0x4f0 [ 425.430136] ? kernfs_fop_write+0x227/0x480 15:01:30 executing program 3 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000010000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 425.434483] ? find_held_lock+0x36/0x1c0 [ 425.438560] ? lock_release+0x9f0/0x9f0 [ 425.442558] ? graph_lock+0x170/0x170 [ 425.446396] cgroup_file_write+0x31f/0x840 [ 425.450653] ? cpuset_css_offline+0xb0/0xb0 [ 425.454994] ? cgroup_migrate_add_task+0xcd0/0xcd0 [ 425.459939] ? __lock_is_held+0xb5/0x140 [ 425.464032] ? cgroup_migrate_add_task+0xcd0/0xcd0 [ 425.468977] kernfs_fop_write+0x2ba/0x480 [ 425.473206] __vfs_write+0x117/0x9d0 [ 425.476959] ? kernfs_fop_open+0x1020/0x1020 15:01:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) [ 425.481411] ? kernel_read+0x120/0x120 [ 425.485322] ? __lock_is_held+0xb5/0x140 [ 425.489426] ? rcu_read_lock_sched_held+0x108/0x120 [ 425.494463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.500015] ? __sb_start_write+0x17f/0x300 [ 425.504357] vfs_write+0x1fc/0x560 [ 425.507928] ksys_write+0x101/0x260 [ 425.511579] ? __ia32_sys_read+0xb0/0xb0 [ 425.515679] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 425.520806] __x64_sys_write+0x73/0xb0 [ 425.524712] do_syscall_64+0x1b9/0x820 [ 425.528617] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 425.533989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.538950] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 425.543973] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 425.548993] ? recalc_sigpending_tsk+0x180/0x180 [ 425.553755] ? kasan_check_write+0x14/0x20 [ 425.558004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.562858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.568060] RIP: 0033:0x457099 [ 425.571255] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.590191] RSP: 002b:00007f11ef155c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 425.597919] RAX: ffffffffffffffda RBX: 00007f11ef1566d4 RCX: 0000000000457099 [ 425.605189] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 425.612459] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 425.619727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 425.626998] R13: 00000000004d82e0 R14: 00000000004cadb1 R15: 0000000000000001 [ 425.678330] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:31 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 425.717615] loop7: p1 size 117440512 extends beyond EOD, truncated [ 425.758547] FAULT_INJECTION: forcing a failure. [ 425.758547] name failslab, interval 1, probability 0, space 0, times 0 [ 425.769936] CPU: 1 PID: 24579 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 425.778442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.787813] Call Trace: [ 425.790432] dump_stack+0x1c9/0x2b4 [ 425.794084] ? dump_stack_print_info.cold.2+0x52/0x52 [ 425.799333] ? perf_trace_lock+0xde/0x920 [ 425.803519] should_fail.cold.4+0xa/0x11 [ 425.807607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.812732] ? mark_held_locks+0x160/0x160 [ 425.816984] ? __kernel_text_address+0xd/0x40 [ 425.821500] ? unwind_get_return_address+0x61/0xa0 [ 425.826479] ? zap_class+0x740/0x740 [ 425.830218] ? find_held_lock+0x36/0x1c0 [ 425.834362] ? check_same_owner+0x340/0x340 [ 425.838724] ? rcu_note_context_switch+0x680/0x680 [ 425.843686] __should_failslab+0x124/0x180 [ 425.847945] should_failslab+0x9/0x14 [ 425.851766] kmem_cache_alloc+0x29c/0x710 15:01:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 425.855947] ? mpol_shared_policy_init+0x235/0x670 [ 425.860899] ? current_time+0x72/0x1b0 [ 425.864815] __d_alloc+0xc8/0xd50 [ 425.868294] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 425.873347] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 425.878575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.884139] ? timespec64_trunc+0xea/0x180 [ 425.888415] ? inode_init_owner+0x340/0x340 [ 425.892768] ? _raw_spin_unlock+0x22/0x30 [ 425.896948] ? current_time+0x10b/0x1b0 [ 425.900949] ? __lockdep_init_map+0x105/0x590 [ 425.905481] d_alloc_pseudo+0x1d/0x30 15:01:31 executing program 5 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 425.909298] alloc_file_pseudo+0x158/0x3f0 [ 425.913558] ? alloc_file+0x4d0/0x4d0 [ 425.917399] ? check_same_owner+0x340/0x340 [ 425.921749] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 425.926787] ? __check_object_size+0xa3/0x5d7 [ 425.931301] ? kasan_check_write+0x14/0x20 [ 425.935592] __shmem_file_setup.part.45+0x110/0x2a0 [ 425.940639] shmem_file_setup+0x65/0x90 [ 425.944636] __x64_sys_memfd_create+0x2af/0x4f0 [ 425.949329] ? memfd_fcntl+0x1580/0x1580 [ 425.953701] do_syscall_64+0x1b9/0x820 [ 425.957619] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 425.963006] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.967948] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 425.972986] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 425.978017] ? recalc_sigpending_tsk+0x180/0x180 [ 425.982789] ? kasan_check_write+0x14/0x20 [ 425.987067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.991939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.997138] RIP: 0033:0x457099 15:01:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 426.000353] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.019274] RSP: 002b:00007f947c557a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 426.027035] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457099 [ 426.034329] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 426.041613] RBP: 00000000009300a0 R08: 0000000000000000 R09: 00000000fbad8001 [ 426.048899] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000004 [ 426.056186] R13: 00000000004d7218 R14: 00000000004ca2b7 R15: 0000000000000002 15:01:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2, &(0x7f0000000240)) 15:01:31 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5", 0x4}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 15:01:31 executing program 3 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000400000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:31 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 426.342330] FAULT_INJECTION: forcing a failure. [ 426.342330] name failslab, interval 1, probability 0, space 0, times 0 [ 426.353705] CPU: 0 PID: 24625 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 426.362213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.371569] Call Trace: [ 426.374245] dump_stack+0x1c9/0x2b4 [ 426.377922] ? dump_stack_print_info.cold.2+0x52/0x52 [ 426.383154] ? perf_trace_lock+0xde/0x920 [ 426.387339] should_fail.cold.4+0xa/0x11 [ 426.391436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.393672] FAULT_INJECTION: forcing a failure. [ 426.393672] name failslab, interval 1, probability 0, space 0, times 0 [ 426.396571] ? lock_downgrade+0x8f0/0x8f0 [ 426.396597] ? proc_fail_nth_write+0x9e/0x210 [ 426.396626] ? find_held_lock+0x36/0x1c0 [ 426.420528] ? check_same_owner+0x340/0x340 [ 426.424861] ? rcu_note_context_switch+0x680/0x680 [ 426.429818] __should_failslab+0x124/0x180 [ 426.434062] should_failslab+0x9/0x14 [ 426.437868] __kmalloc+0x2b2/0x720 [ 426.441424] ? strncpy_from_user+0x510/0x510 [ 426.445839] ? fput+0x130/0x1a0 [ 426.449136] ? do_syscall_64+0x9a/0x820 [ 426.453131] ? __x64_sys_memfd_create+0x142/0x4f0 [ 426.458007] ? do_syscall_64+0x9a/0x820 [ 426.462002] __x64_sys_memfd_create+0x142/0x4f0 [ 426.466683] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.472254] ? memfd_fcntl+0x1580/0x1580 [ 426.476336] ? ksys_ioctl+0x81/0xd0 [ 426.479978] do_syscall_64+0x1b9/0x820 [ 426.483872] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 426.489249] ? syscall_return_slowpath+0x5e0/0x5e0 [ 426.494185] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 426.499220] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 426.504241] ? recalc_sigpending_tsk+0x180/0x180 [ 426.509006] ? kasan_check_write+0x14/0x20 [ 426.513261] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.518123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.523318] RIP: 0033:0x457099 [ 426.526527] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.545426] RSP: 002b:00007ff3bac40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 426.553145] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457099 [ 426.560420] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c260a [ 426.567689] RBP: 00000000009300a0 R08: 0000000020000218 R09: 00000000fbad8001 [ 426.574962] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 426.582237] R13: 00000000004d7188 R14: 00000000004ca238 R15: 0000000000000000 15:01:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 426.589533] CPU: 1 PID: 24627 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 426.598039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.599568] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 426.607401] Call Trace: [ 426.607423] dump_stack+0x1c9/0x2b4 [ 426.607443] ? dump_stack_print_info.cold.2+0x52/0x52 [ 426.607466] ? perf_trace_lock+0xde/0x920 [ 426.607489] should_fail.cold.4+0xa/0x11 [ 426.631690] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.636879] ? save_stack+0x43/0xd0 15:01:32 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f50003", 0x6}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 426.640523] ? kasan_kmalloc+0xc4/0xe0 [ 426.644426] ? kasan_slab_alloc+0x12/0x20 [ 426.648587] ? kmem_cache_alloc+0x12e/0x710 [ 426.652923] ? __d_alloc+0xc8/0xd50 [ 426.653346] loop7: p1 size 117440512 extends beyond EOD, [ 426.656564] ? zap_class+0x740/0x740 [ 426.656588] ? lock_downgrade+0x8f0/0x8f0 [ 426.656603] ? graph_lock+0x170/0x170 [ 426.656622] ? find_held_lock+0x36/0x1c0 [ 426.656659] ? check_same_owner+0x340/0x340 [ 426.662336] truncated [ 426.665911] ? lock_downgrade+0x8f0/0x8f0 [ 426.665929] ? rcu_note_context_switch+0x680/0x680 [ 426.665952] __should_failslab+0x124/0x180 [ 426.665975] should_failslab+0x9/0x14 [ 426.701783] kmem_cache_alloc+0x29c/0x710 [ 426.705942] ? kasan_check_write+0x14/0x20 [ 426.710191] __alloc_file+0xac/0x400 [ 426.713923] ? file_free_rcu+0x90/0x90 [ 426.717825] ? lock_downgrade+0x8f0/0x8f0 [ 426.721982] ? kasan_check_read+0x11/0x20 [ 426.726133] ? do_raw_spin_unlock+0xa7/0x2f0 [ 426.730569] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 426.735165] alloc_empty_file+0x72/0x170 [ 426.739235] alloc_file+0x5e/0x4d0 [ 426.742795] alloc_file_pseudo+0x261/0x3f0 [ 426.747040] ? alloc_file+0x4d0/0x4d0 [ 426.750847] ? check_same_owner+0x340/0x340 [ 426.755182] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 426.760212] ? __check_object_size+0xa3/0x5d7 [ 426.764719] ? kasan_check_write+0x14/0x20 [ 426.768970] __shmem_file_setup.part.45+0x110/0x2a0 [ 426.773994] shmem_file_setup+0x65/0x90 [ 426.777977] __x64_sys_memfd_create+0x2af/0x4f0 [ 426.782668] ? memfd_fcntl+0x1580/0x1580 [ 426.786747] do_syscall_64+0x1b9/0x820 [ 426.790655] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 426.796037] ? syscall_return_slowpath+0x5e0/0x5e0 [ 426.800975] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 426.805999] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 426.811021] ? recalc_sigpending_tsk+0x180/0x180 [ 426.815781] ? kasan_check_write+0x14/0x20 [ 426.820029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.824886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.830103] RIP: 0033:0x457099 [ 426.833323] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.852224] RSP: 002b:00007f947c557a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 426.859942] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457099 [ 426.867210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 426.874485] RBP: 00000000009300a0 R08: 0000000000000000 R09: 00000000fbad8001 [ 426.882101] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000004 15:01:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x20000080) [ 426.889368] R13: 00000000004d7218 R14: 00000000004ca2b7 R15: 0000000000000003 15:01:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfffffff6, &(0x7f0000000240)) 15:01:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:32 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:32 executing program 3 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:32 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a003f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x8000002000000000) [ 427.176475] FAULT_INJECTION: forcing a failure. [ 427.176475] name failslab, interval 1, probability 0, space 0, times 0 [ 427.187947] CPU: 0 PID: 24657 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 427.196471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.205851] Call Trace: [ 427.208500] dump_stack+0x1c9/0x2b4 [ 427.212171] ? dump_stack_print_info.cold.2+0x52/0x52 [ 427.217423] ? perf_trace_lock+0x49d/0x920 [ 427.221721] should_fail.cold.4+0xa/0x11 [ 427.225829] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.228271] FAULT_INJECTION: forcing a failure. [ 427.228271] name failslab, interval 1, probability 0, space 0, times 0 [ 427.230972] ? is_bpf_text_address+0xd7/0x170 [ 427.230999] ? kernel_text_address+0x79/0xf0 [ 427.231029] ? __kernel_text_address+0xd/0x40 [ 427.255603] ? unwind_get_return_address+0x61/0xa0 [ 427.260557] ? __save_stack_trace+0x8d/0xf0 [ 427.264900] ? find_held_lock+0x36/0x1c0 [ 427.269024] ? check_same_owner+0x340/0x340 [ 427.273403] ? rcu_note_context_switch+0x680/0x680 [ 427.278350] ? lock_downgrade+0x8f0/0x8f0 [ 427.282536] __should_failslab+0x124/0x180 [ 427.286793] should_failslab+0x9/0x14 [ 427.290613] kmem_cache_alloc_trace+0x2b5/0x730 [ 427.295306] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 427.300013] apparmor_file_alloc_security+0x162/0xa90 [ 427.305214] ? trace_hardirqs_on+0xbd/0x2c0 [ 427.309550] ? rcu_pm_notify+0xc0/0xc0 [ 427.313462] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 427.319293] ? rcu_read_lock_sched_held+0x108/0x120 [ 427.324328] ? kmem_cache_alloc+0x30b/0x710 [ 427.328677] ? kasan_check_write+0x14/0x20 [ 427.332940] security_file_alloc+0x4c/0xa0 [ 427.337195] __alloc_file+0xfc/0x400 [ 427.340931] ? file_free_rcu+0x90/0x90 [ 427.344840] ? lock_downgrade+0x8f0/0x8f0 [ 427.349017] ? kasan_check_read+0x11/0x20 [ 427.353233] ? do_raw_spin_unlock+0xa7/0x2f0 [ 427.357673] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 427.362281] alloc_empty_file+0x72/0x170 [ 427.366365] alloc_file+0x5e/0x4d0 [ 427.369939] alloc_file_pseudo+0x261/0x3f0 [ 427.374200] ? alloc_file+0x4d0/0x4d0 [ 427.378056] ? check_same_owner+0x340/0x340 [ 427.382421] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 427.387458] ? __check_object_size+0xa3/0x5d7 [ 427.391977] ? kasan_check_write+0x14/0x20 [ 427.396238] __shmem_file_setup.part.45+0x110/0x2a0 [ 427.401284] shmem_file_setup+0x65/0x90 [ 427.405287] __x64_sys_memfd_create+0x2af/0x4f0 [ 427.409976] ? memfd_fcntl+0x1580/0x1580 [ 427.414079] do_syscall_64+0x1b9/0x820 [ 427.417990] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 427.423373] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.428334] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 427.433378] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 427.438428] ? recalc_sigpending_tsk+0x180/0x180 [ 427.443203] ? kasan_check_write+0x14/0x20 [ 427.447467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.452342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.457548] RIP: 0033:0x457099 [ 427.460755] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.479673] RSP: 002b:00007f947c557a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 427.487411] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457099 [ 427.494693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 427.501974] RBP: 00000000009300a0 R08: 0000000000000000 R09: 00000000fbad8001 [ 427.509260] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000004 [ 427.516543] R13: 00000000004d7218 R14: 00000000004ca2b7 R15: 0000000000000004 [ 427.523987] CPU: 1 PID: 24661 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 427.532500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.541857] Call Trace: [ 427.544462] dump_stack+0x1c9/0x2b4 [ 427.548112] ? dump_stack_print_info.cold.2+0x52/0x52 [ 427.553331] ? perf_trace_lock+0xde/0x920 [ 427.557500] should_fail.cold.4+0xa/0x11 [ 427.561582] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.566710] ? find_held_lock+0x36/0x1c0 [ 427.570799] ? __lock_acquire+0x7fc/0x5020 15:01:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xffffffffffffffff, &(0x7f0000000240)) [ 427.575050] ? lock_downgrade+0x8f0/0x8f0 [ 427.579216] ? find_held_lock+0x36/0x1c0 [ 427.583318] ? check_same_owner+0x340/0x340 [ 427.587662] ? rcu_note_context_switch+0x680/0x680 [ 427.592606] ? find_held_lock+0x36/0x1c0 [ 427.596693] __should_failslab+0x124/0x180 [ 427.600946] should_failslab+0x9/0x14 [ 427.604766] kmem_cache_alloc+0x29c/0x710 [ 427.608933] ? lock_downgrade+0x8f0/0x8f0 [ 427.613096] ? shmem_destroy_callback+0xc0/0xc0 [ 427.617773] shmem_alloc_inode+0x1b/0x40 [ 427.621843] alloc_inode+0x63/0x190 [ 427.625479] new_inode_pseudo+0x71/0x1a0 [ 427.629546] ? prune_icache_sb+0x1c0/0x1c0 [ 427.633793] ? _raw_spin_unlock+0x22/0x30 [ 427.637950] new_inode+0x1c/0x40 [ 427.641330] shmem_get_inode+0xf1/0x910 [ 427.645310] ? shmem_encode_fh+0x340/0x340 [ 427.649547] ? lock_downgrade+0x8f0/0x8f0 [ 427.653702] ? lock_release+0x9f0/0x9f0 [ 427.657685] ? check_same_owner+0x340/0x340 [ 427.662013] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 427.667033] ? __check_object_size+0xa3/0x5d7 [ 427.671574] __shmem_file_setup.part.45+0x83/0x2a0 [ 427.676520] shmem_file_setup+0x65/0x90 [ 427.680507] __x64_sys_memfd_create+0x2af/0x4f0 [ 427.685191] ? memfd_fcntl+0x1580/0x1580 [ 427.689258] ? ksys_ioctl+0x81/0xd0 [ 427.692905] do_syscall_64+0x1b9/0x820 [ 427.696805] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 427.702180] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.707118] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 427.712170] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 427.717193] ? recalc_sigpending_tsk+0x180/0x180 [ 427.721958] ? kasan_check_write+0x14/0x20 [ 427.726203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.731059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.736250] RIP: 0033:0x457099 [ 427.739451] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.758357] RSP: 002b:00007ff3bac40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 427.766081] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457099 [ 427.773352] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c260a [ 427.780628] RBP: 00000000009300a0 R08: 0000000020000218 R09: 00000000fbad8001 [ 427.787900] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 427.795178] R13: 00000000004d7188 R14: 00000000004ca238 R15: 0000000000000001 15:01:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x100000000000000) 15:01:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:33 executing program 3 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a1c5ee539c37d1f230000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 427.947812] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x10000000, &(0x7f0000000240)) 15:01:33 executing program 6 (fault-call:1 fault-nth:0): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:33 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 427.996624] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0xe401000000000000) [ 428.119745] FAULT_INJECTION: forcing a failure. [ 428.119745] name failslab, interval 1, probability 0, space 0, times 0 [ 428.131181] CPU: 0 PID: 24705 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 428.139690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.149055] Call Trace: [ 428.151670] dump_stack+0x1c9/0x2b4 [ 428.155319] ? dump_stack_print_info.cold.2+0x52/0x52 [ 428.160538] should_fail.cold.4+0xa/0x11 [ 428.164625] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.169755] ? mark_held_locks+0x160/0x160 [ 428.174009] ? __kernel_text_address+0xd/0x40 [ 428.178526] ? unwind_get_return_address+0x61/0xa0 [ 428.183491] ? find_held_lock+0x36/0x1c0 [ 428.187627] ? check_same_owner+0x340/0x340 [ 428.191989] ? rcu_note_context_switch+0x680/0x680 [ 428.196938] __should_failslab+0x124/0x180 [ 428.201189] should_failslab+0x9/0x14 [ 428.205003] kmem_cache_alloc+0x29c/0x710 [ 428.209166] ? mpol_shared_policy_init+0x235/0x670 [ 428.214107] ? current_time+0x72/0x1b0 [ 428.218011] __d_alloc+0xc8/0xd50 [ 428.221479] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 428.226529] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 428.231731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.237276] ? timespec64_trunc+0xea/0x180 [ 428.241521] ? inode_init_owner+0x340/0x340 [ 428.245859] ? _raw_spin_unlock+0x22/0x30 [ 428.250031] ? current_time+0x10b/0x1b0 [ 428.254014] ? __lockdep_init_map+0x105/0x590 [ 428.258533] d_alloc_pseudo+0x1d/0x30 [ 428.262344] alloc_file_pseudo+0x158/0x3f0 [ 428.266595] ? alloc_file+0x4d0/0x4d0 [ 428.270416] ? check_same_owner+0x340/0x340 [ 428.274841] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 428.279873] ? __check_object_size+0xa3/0x5d7 [ 428.284395] ? kasan_check_write+0x14/0x20 [ 428.288662] __shmem_file_setup.part.45+0x110/0x2a0 [ 428.293696] shmem_file_setup+0x65/0x90 [ 428.297687] __x64_sys_memfd_create+0x2af/0x4f0 [ 428.302378] ? memfd_fcntl+0x1580/0x1580 [ 428.306462] ? ksys_ioctl+0x81/0xd0 [ 428.310114] do_syscall_64+0x1b9/0x820 [ 428.314011] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 428.319394] ? syscall_return_slowpath+0x5e0/0x5e0 [ 428.324332] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 428.329362] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 428.334400] ? recalc_sigpending_tsk+0x180/0x180 [ 428.339165] ? kasan_check_write+0x14/0x20 [ 428.343423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.348315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.353530] RIP: 0033:0x457099 15:01:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 428.356732] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.375637] RSP: 002b:00007ff3bac40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 428.383361] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457099 [ 428.390641] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c260a [ 428.397921] RBP: 00000000009300a0 R08: 0000000020000218 R09: 00000000fbad8001 [ 428.405189] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 428.412473] R13: 00000000004d7188 R14: 00000000004ca238 R15: 0000000000000002 [ 428.421424] FAULT_INJECTION: forcing a failure. [ 428.421424] name failslab, interval 1, probability 0, space 0, times 0 [ 428.432710] CPU: 1 PID: 24713 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 428.441210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.450566] Call Trace: [ 428.453170] dump_stack+0x1c9/0x2b4 [ 428.456809] ? dump_stack_print_info.cold.2+0x52/0x52 [ 428.462017] ? perf_trace_lock+0xde/0x920 [ 428.466190] should_fail.cold.4+0xa/0x11 [ 428.470277] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.475402] ? lock_downgrade+0x8f0/0x8f0 [ 428.479568] ? timespec64_trunc+0xea/0x180 [ 428.483812] ? find_held_lock+0x36/0x1c0 [ 428.487911] ? check_same_owner+0x340/0x340 [ 428.492248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.497792] ? rcu_note_context_switch+0x680/0x680 [ 428.502739] __should_failslab+0x124/0x180 [ 428.506983] should_failslab+0x9/0x14 [ 428.510792] kmem_cache_alloc+0x29c/0x710 [ 428.514947] ? lock_downgrade+0x8f0/0x8f0 [ 428.519132] getname_flags+0xd0/0x5a0 [ 428.522994] getname+0x19/0x20 [ 428.526194] do_sys_open+0x3a2/0x720 [ 428.529926] ? filp_open+0x80/0x80 [ 428.533517] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 428.538625] ? do_sys_ftruncate+0x44e/0x560 [ 428.542961] __x64_sys_open+0x7e/0xc0 [ 428.546802] do_syscall_64+0x1b9/0x820 [ 428.550700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 428.556071] ? syscall_return_slowpath+0x5e0/0x5e0 [ 428.561010] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 428.566041] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 428.571062] ? recalc_sigpending_tsk+0x180/0x180 [ 428.575826] ? kasan_check_write+0x14/0x20 [ 428.580078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.584949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.590137] RIP: 0033:0x410dd1 [ 428.593346] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 428.612261] RSP: 002b:00007f947c536a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 15:01:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 428.619975] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000410dd1 [ 428.627245] RDX: 00007f947c536afa RSI: 0000000000000002 RDI: 00007f947c536af0 [ 428.634515] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 428.641784] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 428.649057] R13: 0000000000000000 R14: 00000000004ca2b7 R15: 0000000000000005 15:01:34 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 428.734333] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:34 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x5, &(0x7f0000000240)) [ 428.763357] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a8cffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xffffff97, &(0x7f0000000240)) 15:01:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x80000020) [ 429.089730] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 429.104519] FAULT_INJECTION: forcing a failure. [ 429.104519] name failslab, interval 1, probability 0, space 0, times 0 [ 429.115966] CPU: 1 PID: 24744 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 429.118162] loop7: p1 size 117440512 extends beyond EOD, [ 429.124471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.124478] Call Trace: [ 429.124502] dump_stack+0x1c9/0x2b4 [ 429.124526] ? dump_stack_print_info.cold.2+0x52/0x52 [ 429.124560] should_fail.cold.4+0xa/0x11 [ 429.124585] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 429.124605] ? save_stack+0x43/0xd0 [ 429.130168] truncated [ 429.139497] ? kasan_kmalloc+0xc4/0xe0 [ 429.139512] ? kasan_slab_alloc+0x12/0x20 [ 429.139525] ? kmem_cache_alloc+0x12e/0x710 [ 429.139538] ? __d_alloc+0xc8/0xd50 [ 429.139564] ? lock_downgrade+0x8f0/0x8f0 [ 429.186193] ? graph_lock+0x170/0x170 [ 429.190004] ? find_held_lock+0x36/0x1c0 [ 429.194102] ? check_same_owner+0x340/0x340 [ 429.198432] ? lock_downgrade+0x8f0/0x8f0 [ 429.202587] ? rcu_note_context_switch+0x680/0x680 [ 429.207532] __should_failslab+0x124/0x180 [ 429.211789] should_failslab+0x9/0x14 [ 429.215607] kmem_cache_alloc+0x29c/0x710 [ 429.219786] ? kasan_check_write+0x14/0x20 [ 429.224076] __alloc_file+0xac/0x400 [ 429.227795] ? file_free_rcu+0x90/0x90 [ 429.231695] ? lock_downgrade+0x8f0/0x8f0 [ 429.235858] ? kasan_check_read+0x11/0x20 [ 429.240017] ? do_raw_spin_unlock+0xa7/0x2f0 [ 429.244432] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 429.249022] alloc_empty_file+0x72/0x170 [ 429.253095] alloc_file+0x5e/0x4d0 [ 429.256649] alloc_file_pseudo+0x261/0x3f0 [ 429.260899] ? alloc_file+0x4d0/0x4d0 [ 429.264714] ? check_same_owner+0x340/0x340 [ 429.269042] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 429.274064] ? __check_object_size+0xa3/0x5d7 [ 429.278572] ? kasan_check_write+0x14/0x20 [ 429.282818] __shmem_file_setup.part.45+0x110/0x2a0 [ 429.287859] shmem_file_setup+0x65/0x90 [ 429.291856] __x64_sys_memfd_create+0x2af/0x4f0 [ 429.296542] ? memfd_fcntl+0x1580/0x1580 [ 429.300616] ? ksys_ioctl+0x81/0xd0 [ 429.304259] do_syscall_64+0x1b9/0x820 [ 429.308159] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 429.313533] ? syscall_return_slowpath+0x5e0/0x5e0 [ 429.318471] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 429.323494] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 429.328513] ? recalc_sigpending_tsk+0x180/0x180 [ 429.333273] ? kasan_check_write+0x14/0x20 [ 429.337523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.342376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.347595] RIP: 0033:0x457099 [ 429.350798] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.369874] RSP: 002b:00007ff3bac40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 429.377593] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457099 15:01:34 executing program 3 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:34 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0908f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000004c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x100002}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 429.384864] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c260a [ 429.392144] RBP: 00000000009300a0 R08: 0000000020000218 R09: 00000000fbad8001 [ 429.399423] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 429.406696] R13: 00000000004d7188 R14: 00000000004ca238 R15: 0000000000000003 15:01:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x11000, &(0x7f0000000240)) [ 429.504221] FAULT_INJECTION: forcing a failure. [ 429.504221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.516083] CPU: 1 PID: 24776 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 429.524586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.533948] Call Trace: [ 429.536546] dump_stack+0x1c9/0x2b4 [ 429.540193] ? dump_stack_print_info.cold.2+0x52/0x52 [ 429.545417] ? mark_held_locks+0x160/0x160 [ 429.549683] should_fail.cold.4+0xa/0x11 [ 429.553758] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 429.558871] ? print_usage_bug+0xc0/0xc0 [ 429.562950] ? perf_trace_lock+0xde/0x920 [ 429.567120] ? mark_held_locks+0x160/0x160 [ 429.571367] ? zap_class+0x740/0x740 [ 429.575092] ? graph_lock+0x170/0x170 [ 429.578905] ? print_usage_bug+0xc0/0xc0 [ 429.582978] ? graph_lock+0x170/0x170 [ 429.586793] ? lock_downgrade+0x8f0/0x8f0 [ 429.590960] ? perf_trace_lock+0xde/0x920 [ 429.595125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.600691] ? should_fail+0x246/0xd86 [ 429.604596] ? zap_class+0x740/0x740 [ 429.608322] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 429.613438] __alloc_pages_nodemask+0x365/0xd10 [ 429.618114] ? lock_downgrade+0x8f0/0x8f0 [ 429.622277] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 429.627295] ? timespec64_trunc+0xea/0x180 [ 429.631542] ? find_held_lock+0x36/0x1c0 [ 429.635632] ? trace_hardirqs_off+0xb8/0x2b0 [ 429.640053] cache_grow_begin+0x91/0x710 [ 429.644130] kmem_cache_alloc+0x63a/0x710 [ 429.648297] ? lock_downgrade+0x8f0/0x8f0 [ 429.652457] getname_flags+0xd0/0x5a0 [ 429.656269] getname+0x19/0x20 [ 429.659473] do_sys_open+0x3a2/0x720 [ 429.663211] ? filp_open+0x80/0x80 [ 429.666778] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 429.671889] ? do_sys_ftruncate+0x44e/0x560 [ 429.676245] __x64_sys_open+0x7e/0xc0 [ 429.680060] do_syscall_64+0x1b9/0x820 [ 429.683957] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 429.689325] ? syscall_return_slowpath+0x5e0/0x5e0 [ 429.694272] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 429.699302] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 429.704331] ? recalc_sigpending_tsk+0x180/0x180 [ 429.709101] ? kasan_check_write+0x14/0x20 [ 429.713344] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.718193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.723411] RIP: 0033:0x410dd1 [ 429.726615] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 429.745517] RSP: 002b:00007f947c557a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 15:01:35 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000919", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 429.753251] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000410dd1 [ 429.760517] RDX: 00007f947c557afa RSI: 0000000000000002 RDI: 00007f947c557af0 [ 429.767797] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 429.775068] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 429.782337] R13: 0000000000000000 R14: 00000000004ca2b7 R15: 0000000000000006 15:01:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 429.845622] hfs: can't find a HFS filesystem on dev loop3 15:01:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:35 executing program 3 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffffd0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6c00000000000000, &(0x7f0000000240)) 15:01:35 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5080319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 430.050709] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 430.084365] loop7: p1 size 117440512 extends beyond EOD, truncated [ 430.121789] FAULT_INJECTION: forcing a failure. [ 430.121789] name failslab, interval 1, probability 0, space 0, times 0 [ 430.133132] CPU: 1 PID: 24811 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 430.141641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.151003] Call Trace: [ 430.153623] dump_stack+0x1c9/0x2b4 [ 430.157281] ? dump_stack_print_info.cold.2+0x52/0x52 [ 430.162530] ? perf_trace_lock+0xde/0x920 [ 430.166704] should_fail.cold.4+0xa/0x11 [ 430.170793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.175925] ? print_usage_bug+0xc0/0xc0 [ 430.180006] ? lock_downgrade+0x8f0/0x8f0 15:01:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 430.184197] ? find_held_lock+0x36/0x1c0 [ 430.188320] ? check_same_owner+0x340/0x340 [ 430.192666] ? rcu_note_context_switch+0x680/0x680 [ 430.197626] __should_failslab+0x124/0x180 [ 430.201888] should_failslab+0x9/0x14 [ 430.205720] kmem_cache_alloc+0x29c/0x710 [ 430.209885] ? graph_lock+0x170/0x170 [ 430.213700] ? mark_held_locks+0x160/0x160 [ 430.217952] __alloc_file+0xac/0x400 [ 430.221677] ? file_free_rcu+0x90/0x90 [ 430.225570] ? mark_held_locks+0x160/0x160 [ 430.229810] ? find_held_lock+0x36/0x1c0 [ 430.233891] ? lock_downgrade+0x8f0/0x8f0 [ 430.238056] alloc_empty_file+0x72/0x170 [ 430.242129] path_openat+0x15f/0x5340 [ 430.245949] ? zap_class+0x740/0x740 [ 430.249676] ? graph_lock+0x170/0x170 [ 430.253490] ? path_lookupat.isra.43+0xc00/0xc00 [ 430.258259] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 430.263284] ? expand_files.part.8+0x571/0x9c0 [ 430.267881] ? find_held_lock+0x36/0x1c0 [ 430.271967] ? lock_downgrade+0x8f0/0x8f0 [ 430.276127] ? do_sys_open+0x3a2/0x720 [ 430.280038] ? kasan_check_read+0x11/0x20 [ 430.284193] ? do_raw_spin_unlock+0xa7/0x2f0 [ 430.288611] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 430.293193] ? __lock_is_held+0xb5/0x140 [ 430.297283] ? _raw_spin_unlock+0x22/0x30 [ 430.301450] ? __alloc_fd+0x34e/0x710 [ 430.305251] ? usercopy_warn+0x120/0x120 [ 430.309333] do_filp_open+0x255/0x380 [ 430.313142] ? may_open_dev+0x100/0x100 [ 430.317163] ? get_unused_fd_flags+0x122/0x1a0 [ 430.321751] ? __alloc_fd+0x710/0x710 [ 430.325566] do_sys_open+0x584/0x720 [ 430.329286] ? filp_open+0x80/0x80 [ 430.332832] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 430.337939] ? do_sys_ftruncate+0x44e/0x560 [ 430.342270] __x64_sys_open+0x7e/0xc0 [ 430.346079] do_syscall_64+0x1b9/0x820 [ 430.349976] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 430.355344] ? syscall_return_slowpath+0x5e0/0x5e0 [ 430.360345] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 430.365364] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 430.370402] ? recalc_sigpending_tsk+0x180/0x180 [ 430.375169] ? kasan_check_write+0x14/0x20 [ 430.379422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.384290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.389484] RIP: 0033:0x410dd1 [ 430.392683] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 430.411598] RSP: 002b:00007f947c557a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 430.419316] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000410dd1 [ 430.426584] RDX: 00007f947c557afa RSI: 0000000000000002 RDI: 00007f947c557af0 15:01:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x1000000) [ 430.433851] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 430.441134] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 430.448413] R13: 0000000000000000 R14: 00000000004ca2b7 R15: 0000000000000007 [ 430.563422] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000000000000, &(0x7f0000000240)) 15:01:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:35 executing program 3 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:36 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000219", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 430.586512] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x1e4) [ 430.746855] FAULT_INJECTION: forcing a failure. [ 430.746855] name failslab, interval 1, probability 0, space 0, times 0 [ 430.758207] CPU: 1 PID: 24847 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 430.766710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.776087] Call Trace: [ 430.778718] dump_stack+0x1c9/0x2b4 [ 430.782393] ? dump_stack_print_info.cold.2+0x52/0x52 [ 430.787603] ? lock_downgrade+0x8f0/0x8f0 [ 430.791777] ? perf_trace_lock+0xde/0x920 15:01:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 430.795957] should_fail.cold.4+0xa/0x11 [ 430.800056] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.805208] ? is_bpf_text_address+0xd7/0x170 [ 430.809722] ? kernel_text_address+0x79/0xf0 [ 430.814143] ? __kernel_text_address+0xd/0x40 [ 430.818667] ? unwind_get_return_address+0x61/0xa0 [ 430.823624] ? __save_stack_trace+0x8d/0xf0 [ 430.827969] ? find_held_lock+0x36/0x1c0 [ 430.832082] ? check_same_owner+0x340/0x340 [ 430.836437] ? rcu_note_context_switch+0x680/0x680 [ 430.841380] ? lock_downgrade+0x8f0/0x8f0 15:01:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0xe4010000) [ 430.845579] __should_failslab+0x124/0x180 [ 430.849839] should_failslab+0x9/0x14 [ 430.853664] kmem_cache_alloc_trace+0x2b5/0x730 [ 430.858362] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 430.863103] apparmor_file_alloc_security+0x162/0xa90 [ 430.868318] ? trace_hardirqs_on+0xbd/0x2c0 [ 430.872654] ? rcu_pm_notify+0xc0/0xc0 [ 430.876564] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 430.882399] ? rcu_read_lock_sched_held+0x108/0x120 [ 430.887447] ? kmem_cache_alloc+0x30b/0x710 [ 430.891789] ? graph_lock+0x170/0x170 15:01:36 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000919", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 430.895626] security_file_alloc+0x4c/0xa0 [ 430.899925] __alloc_file+0xfc/0x400 [ 430.903662] ? file_free_rcu+0x90/0x90 [ 430.907568] ? mark_held_locks+0x160/0x160 [ 430.911827] ? find_held_lock+0x36/0x1c0 [ 430.915922] ? lock_downgrade+0x8f0/0x8f0 [ 430.920101] alloc_empty_file+0x72/0x170 [ 430.924196] path_openat+0x15f/0x5340 [ 430.928026] ? zap_class+0x740/0x740 [ 430.931770] ? graph_lock+0x170/0x170 [ 430.935599] ? path_lookupat.isra.43+0xc00/0xc00 [ 430.940395] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 430.945440] ? expand_files.part.8+0x571/0x9c0 [ 430.950069] ? find_held_lock+0x36/0x1c0 [ 430.954178] ? lock_downgrade+0x8f0/0x8f0 [ 430.958341] ? do_sys_open+0x3a2/0x720 [ 430.962261] ? kasan_check_read+0x11/0x20 [ 430.966445] ? do_raw_spin_unlock+0xa7/0x2f0 [ 430.970886] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 430.975493] ? __lock_is_held+0xb5/0x140 [ 430.979584] ? _raw_spin_unlock+0x22/0x30 [ 430.983753] ? __alloc_fd+0x34e/0x710 [ 430.987566] ? usercopy_warn+0x120/0x120 [ 430.991657] do_filp_open+0x255/0x380 [ 430.995473] ? may_open_dev+0x100/0x100 [ 430.999477] ? get_unused_fd_flags+0x122/0x1a0 [ 431.004082] ? __alloc_fd+0x710/0x710 [ 431.007912] do_sys_open+0x584/0x720 [ 431.011650] ? filp_open+0x80/0x80 [ 431.015238] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 431.020359] ? do_sys_ftruncate+0x44e/0x560 [ 431.024714] __x64_sys_open+0x7e/0xc0 [ 431.028540] do_syscall_64+0x1b9/0x820 [ 431.032444] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 431.037847] ? syscall_return_slowpath+0x5e0/0x5e0 [ 431.042796] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 431.047834] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 431.052862] ? recalc_sigpending_tsk+0x180/0x180 [ 431.057645] ? kasan_check_write+0x14/0x20 [ 431.062423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.067296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.072493] RIP: 0033:0x410dd1 [ 431.075701] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 431.095242] RSP: 002b:00007f947c557a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 431.102970] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000410dd1 [ 431.110253] RDX: 00007f947c557afa RSI: 0000000000000002 RDI: 00007f947c557af0 [ 431.117534] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 431.124817] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 431.132100] R13: 0000000000000000 R14: 00000000004ca2b7 R15: 0000000000000008 [ 431.147073] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 431.162052] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000ffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:36 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7ffff000}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) 15:01:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0xe401) 15:01:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xedc000000000, &(0x7f0000000240)) 15:01:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 431.397961] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:01:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 431.433495] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:37 executing program 3 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:37 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x6}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x80000000, 0x80) openat(r0, &(0x7f0000000140)='./file0\x00', 0x24001, 0xf9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10001) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x0) 15:01:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x68000000, &(0x7f0000000240)) 15:01:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1}}}, 0x330}, 0x1, 0x0, 0x0, 0x800800000000}, 0xc004) [ 431.783578] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 431.811183] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xe909, &(0x7f0000000240)) 15:01:37 executing program 5: getuid() r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000200)={0x1, 0x5, 0x3}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400, 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000100)=""/116) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x117, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000340)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0x0, 0x2, 0x2, 0x4afd, 0x2, [{0x8, 0x6, 0x7, 0x0, 0x0, 0x2}, {0xb61, 0x1, 0x0, 0x0, 0x0, 0x1005}]}) r4 = openat$cgroup_int(r1, &(0x7f0000000480)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080), 0x0) 15:01:37 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x9}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363affffffffffff07000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0xc004) 15:01:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf6ffffff00000000, &(0x7f0000000240)) 15:01:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 432.227582] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 432.272505] loop7: p1 size 117440512 extends beyond EOD, truncated [ 432.314704] FAULT_INJECTION: forcing a failure. [ 432.314704] name failslab, interval 1, probability 0, space 0, times 0 [ 432.326051] CPU: 0 PID: 25014 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 432.334558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.343936] Call Trace: [ 432.346570] dump_stack+0x1c9/0x2b4 [ 432.350261] ? dump_stack_print_info.cold.2+0x52/0x52 [ 432.355497] ? perf_trace_lock+0x49d/0x920 [ 432.359806] should_fail.cold.4+0xa/0x11 [ 432.363915] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.369039] ? perf_swevent_event+0x2e0/0x2e0 [ 432.373542] ? memset+0x31/0x40 [ 432.376823] ? graph_lock+0x170/0x170 [ 432.380642] ? find_held_lock+0x36/0x1c0 [ 432.384722] ? __lock_is_held+0xb5/0x140 [ 432.388803] ? check_same_owner+0x340/0x340 [ 432.393133] ? rcu_note_context_switch+0x680/0x680 [ 432.398071] __should_failslab+0x124/0x180 [ 432.402309] should_failslab+0x9/0x14 [ 432.406107] kmem_cache_alloc_trace+0x2b5/0x730 [ 432.410771] ? init_wait_entry+0x1c0/0x1c0 [ 432.415030] ? loop_get_status64+0x140/0x140 [ 432.419438] __kthread_create_on_node+0x13d/0x530 [ 432.424307] ? __kthread_parkme+0x1b0/0x1b0 [ 432.428644] ? __lockdep_init_map+0x105/0x590 [ 432.433156] ? __lockdep_init_map+0x105/0x590 [ 432.437661] ? loop_get_status64+0x140/0x140 [ 432.442070] kthread_create_on_node+0xb1/0xe0 [ 432.446566] ? __kthread_create_on_node+0x530/0x530 [ 432.451597] lo_ioctl+0x7f6/0x1d90 [ 432.455208] ? lo_rw_aio_complete+0x450/0x450 [ 432.459782] blkdev_ioctl+0x9cd/0x2030 [ 432.463685] ? blkpg_ioctl+0xc40/0xc40 [ 432.467589] ? rcu_is_watching+0x8c/0x150 [ 432.471739] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.476444] ? __fget+0x4d5/0x740 [ 432.479918] ? ksys_dup3+0x690/0x690 [ 432.483630] ? trace_hardirqs_on+0x2c0/0x2c0 [ 432.488041] ? kasan_check_write+0x14/0x20 [ 432.492281] block_ioctl+0xee/0x130 [ 432.495911] ? blkdev_fallocate+0x400/0x400 [ 432.500268] do_vfs_ioctl+0x1de/0x1720 [ 432.504147] ? kasan_check_read+0x11/0x20 [ 432.508290] ? rcu_is_watching+0x8c/0x150 [ 432.512431] ? trace_hardirqs_on+0xbd/0x2c0 [ 432.516749] ? ioctl_preallocate+0x300/0x300 [ 432.521155] ? __fget_light+0x2f7/0x440 [ 432.525124] ? putname+0xf2/0x130 [ 432.528574] ? fget_raw+0x20/0x20 [ 432.532045] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.537080] ? kmem_cache_free+0x246/0x280 [ 432.541338] ? do_syscall_64+0x9a/0x820 [ 432.545315] ? do_syscall_64+0x9a/0x820 [ 432.549301] ? lockdep_hardirqs_on+0x421/0x5c0 [ 432.553896] ? security_file_ioctl+0x94/0xc0 [ 432.558310] ksys_ioctl+0xa9/0xd0 [ 432.561762] __x64_sys_ioctl+0x73/0xb0 [ 432.565702] do_syscall_64+0x1b9/0x820 [ 432.569584] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 432.574945] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.579883] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 432.584911] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 432.589928] ? recalc_sigpending_tsk+0x180/0x180 [ 432.594691] ? kasan_check_write+0x14/0x20 [ 432.598954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.603821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.609022] RIP: 0033:0x456f07 [ 432.612224] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.631127] RSP: 002b:00007f947c557a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 432.638856] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000456f07 [ 432.646134] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 432.653406] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 432.660683] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 432.667961] R13: 0000000000000000 R14: 00000000004ca2b7 R15: 0000000000000009 15:01:38 executing program 3 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:38 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x20000207}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1f00000000000000, &(0x7f0000000240)) 15:01:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:38 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x2) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 432.910022] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 432.927796] FAULT_INJECTION: forcing a failure. [ 432.927796] name failslab, interval 1, probability 0, space 0, times 0 [ 432.939184] CPU: 1 PID: 25050 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 432.947687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.957048] Call Trace: [ 432.959652] dump_stack+0x1c9/0x2b4 [ 432.963308] ? dump_stack_print_info.cold.2+0x52/0x52 [ 432.968551] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.973248] ? perf_trace_lock+0xde/0x920 [ 432.977442] should_fail.cold.4+0xa/0x11 [ 432.981535] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.986689] ? __account_cfs_rq_runtime+0x770/0x770 [ 432.991736] ? mark_held_locks+0x160/0x160 [ 432.995993] ? graph_lock+0x170/0x170 [ 432.999800] ? print_usage_bug+0xc0/0xc0 [ 433.003877] ? find_held_lock+0x36/0x1c0 [ 433.007957] ? __lock_is_held+0xb5/0x140 [ 433.012043] ? check_same_owner+0x340/0x340 [ 433.016370] ? graph_lock+0x170/0x170 [ 433.020192] ? rcu_note_context_switch+0x680/0x680 [ 433.025136] __should_failslab+0x124/0x180 [ 433.029421] should_failslab+0x9/0x14 [ 433.033551] kmem_cache_alloc+0x29c/0x710 [ 433.037708] ? find_held_lock+0x36/0x1c0 [ 433.041782] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.046814] __kernfs_new_node+0x127/0x8d0 [ 433.051092] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 433.055856] ? lockdep_hardirqs_on+0x421/0x5c0 [ 433.060934] ? zap_class+0x740/0x740 [ 433.064657] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.069768] ? lock_repin_lock+0x430/0x430 [ 433.074017] ? graph_lock+0x170/0x170 [ 433.077829] ? _raw_spin_unlock_irq+0x27/0x70 [ 433.082328] ? __schedule+0x14b6/0x1df0 [ 433.086315] ? find_held_lock+0x36/0x1c0 [ 433.090409] kernfs_new_node+0x95/0x120 [ 433.094408] kernfs_create_dir_ns+0x4d/0x160 [ 433.098832] internal_create_group+0x5fe/0xd80 [ 433.103435] ? remove_files.isra.1+0x190/0x190 [ 433.108023] ? up_write+0x7b/0x220 [ 433.111578] ? up_read+0x110/0x110 [ 433.115125] ? down_read+0x1d0/0x1d0 [ 433.118864] sysfs_create_group+0x1f/0x30 [ 433.123026] lo_ioctl+0x1310/0x1d90 [ 433.126769] ? lo_rw_aio_complete+0x450/0x450 [ 433.131275] blkdev_ioctl+0x9cd/0x2030 [ 433.135178] ? blkpg_ioctl+0xc40/0xc40 [ 433.139116] ? rcu_is_watching+0x8c/0x150 [ 433.143273] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 433.147979] ? __fget+0x4d5/0x740 [ 433.151447] ? ksys_dup3+0x690/0x690 [ 433.155170] ? trace_hardirqs_on+0x2c0/0x2c0 [ 433.159588] ? kasan_check_write+0x14/0x20 [ 433.163835] block_ioctl+0xee/0x130 [ 433.167471] ? blkdev_fallocate+0x400/0x400 [ 433.171802] do_vfs_ioctl+0x1de/0x1720 [ 433.175693] ? kasan_check_read+0x11/0x20 [ 433.179846] ? rcu_is_watching+0x8c/0x150 [ 433.184000] ? trace_hardirqs_on+0xbd/0x2c0 [ 433.188341] ? ioctl_preallocate+0x300/0x300 [ 433.192759] ? __fget_light+0x2f7/0x440 [ 433.196734] ? putname+0xf2/0x130 [ 433.200216] ? fget_raw+0x20/0x20 [ 433.203690] ? rcu_read_lock_sched_held+0x108/0x120 [ 433.208711] ? kmem_cache_free+0x246/0x280 [ 433.212958] ? do_syscall_64+0x9a/0x820 [ 433.216939] ? do_syscall_64+0x9a/0x820 [ 433.220920] ? lockdep_hardirqs_on+0x421/0x5c0 [ 433.225511] ? security_file_ioctl+0x94/0xc0 [ 433.229931] ksys_ioctl+0xa9/0xd0 [ 433.233429] __x64_sys_ioctl+0x73/0xb0 [ 433.237323] do_syscall_64+0x1b9/0x820 [ 433.241226] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.246610] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.251550] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 433.256569] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 433.261589] ? recalc_sigpending_tsk+0x180/0x180 [ 433.266353] ? kasan_check_write+0x14/0x20 [ 433.270605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.275459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.280651] RIP: 0033:0x456f07 [ 433.283853] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.302762] RSP: 002b:00007f947c557a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:01:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x10010000000000, &(0x7f0000000240)) [ 433.310473] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000456f07 [ 433.317746] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 433.325017] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 433.332284] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 433.339556] R13: 0000000000000000 R14: 00000000004ca2b7 R15: 000000000000000a 15:01:38 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x800) ioctl$RTC_PIE_OFF(r0, 0x7006) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='io.bfq.weight\x00', 0x2, 0x0) fallocate(r1, 0x0, 0x80000000, 0x1) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 15:01:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffffb000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 433.361210] loop7: p1 size 117440512 extends beyond EOD, truncated 15:01:38 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 433.432514] hfs: can't find a HFS filesystem on dev loop3 [ 433.466240] FAULT_INJECTION: forcing a failure. [ 433.466240] name failslab, interval 1, probability 0, space 0, times 0 [ 433.477558] CPU: 0 PID: 25067 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 433.486073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.495438] Call Trace: [ 433.498049] dump_stack+0x1c9/0x2b4 [ 433.501707] ? dump_stack_print_info.cold.2+0x52/0x52 [ 433.506935] ? perf_trace_lock+0xde/0x920 [ 433.511121] should_fail.cold.4+0xa/0x11 [ 433.515212] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 433.520337] ? rcu_is_watching+0x8c/0x150 [ 433.524527] ? __local_bh_enable_ip+0x161/0x230 [ 433.529215] ? graph_lock+0x170/0x170 [ 433.533036] ? graph_lock+0x170/0x170 [ 433.536855] ? find_held_lock+0x36/0x1c0 [ 433.540964] ? check_same_owner+0x340/0x340 [ 433.545314] ? rcu_note_context_switch+0x680/0x680 [ 433.550263] ? _raw_spin_unlock_bh+0x30/0x40 [ 433.554701] __should_failslab+0x124/0x180 [ 433.558960] should_failslab+0x9/0x14 [ 433.562779] kmem_cache_alloc_node+0x256/0x720 [ 433.567400] ? __local_bh_enable_ip+0x161/0x230 [ 433.572095] ? _raw_spin_unlock_bh+0x30/0x40 [ 433.576554] __alloc_skb+0x119/0x770 [ 433.580286] ? skb_scrub_packet+0x490/0x490 [ 433.584671] ? netlink_insert+0x15d/0x3f0 [ 433.588837] ? __netlink_insert+0x13d0/0x13d0 [ 433.593360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.598916] ? netlink_autobind.isra.34+0x23b/0x320 [ 433.603948] netlink_sendmsg+0xb29/0xfc0 [ 433.608023] ? netlink_unicast+0x760/0x760 [ 433.612268] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 433.617210] ? apparmor_socket_sendmsg+0x29/0x30 [ 433.621976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.627527] ? security_socket_sendmsg+0x94/0xc0 [ 433.632294] ? netlink_unicast+0x760/0x760 [ 433.636595] sock_sendmsg+0xd5/0x120 [ 433.640326] ___sys_sendmsg+0x7fd/0x930 [ 433.644318] ? copy_msghdr_from_user+0x580/0x580 [ 433.649084] ? lock_downgrade+0x8f0/0x8f0 [ 433.653248] ? proc_fail_nth_write+0x9e/0x210 [ 433.657759] ? __fget_light+0x2f7/0x440 [ 433.661748] ? fget_raw+0x20/0x20 [ 433.665203] ? find_held_lock+0x36/0x1c0 [ 433.669274] ? kasan_check_write+0x14/0x20 [ 433.673513] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 433.678452] ? wait_for_completion+0x8d0/0x8d0 [ 433.683052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.688597] ? sockfd_lookup_light+0xc5/0x160 [ 433.693112] __sys_sendmsg+0x11d/0x290 [ 433.697029] ? __ia32_sys_shutdown+0x80/0x80 [ 433.701444] ? __sb_end_write+0xac/0xe0 [ 433.705431] ? fput+0x130/0x1a0 [ 433.708731] ? do_syscall_64+0x9a/0x820 [ 433.712709] ? do_syscall_64+0x9a/0x820 [ 433.716699] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.721808] ? ksys_ioctl+0x81/0xd0 [ 433.725445] __x64_sys_sendmsg+0x78/0xb0 [ 433.729512] do_syscall_64+0x1b9/0x820 [ 433.733414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.738786] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.743726] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 433.748749] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 433.753769] ? recalc_sigpending_tsk+0x180/0x180 [ 433.758530] ? kasan_check_write+0x14/0x20 [ 433.762780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.767639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.772836] RIP: 0033:0x457099 [ 433.776038] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.794939] RSP: 002b:00007fa80a676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 433.802662] RAX: ffffffffffffffda RBX: 00007fa80a6776d4 RCX: 0000000000457099 [ 433.809933] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 433.817202] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 433.824467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 15:01:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x5) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 15:01:39 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x9) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 433.831737] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000000 15:01:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x0, &(0x7f0000000540)) 15:01:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000100000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x48, &(0x7f0000000240)) 15:01:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu\x00', 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x7, &(0x7f0000000500)=[{&(0x7f0000000140)="e6fcd20e09dcaeab5519d886ab01bce3e4b4fef1b25ba2adecf53a6d275b911f0d240b06e886736f83371ff4904c7558675732aae2dc9c188afc57", 0x3b, 0x8}, {&(0x7f0000000180)="272e85977b0b67a6d3bde9b81de019816dedc6ac50d6386366927e23a5b5d473041eb345fd487287870029f081af1f129046b6f8c3b5a26faef47c2f3331a9fbfd10bf6489749772d00965460364e4be105754806153797b09215f8a8672f5eeeb70d5a1", 0x64, 0x1f1}, {&(0x7f0000000200)="4fa9def14679d325b86f1edd2a9dc5b19298b49dcc7707bed28e05cab8ead8083cd1fb583f6b5f55fe6fe47f1328d4778536b52269f108e579417e30a2d011799eb9c52a1d6e8b020517dd37c2bb6eba2e0539399d5d5d9c07f37bdd38c181cd086eb639edd2d9a5c5cbc9958a5c0b67395a953ce7330fe79284bac274e042d592b6aae4e4afad2045344e91e705d2fa7c7a2a48d4ed7fe7b4f0df9258530e4d6a297b290d2ec6f3063758b7d7870ea175806b8f63d102473e6afa914c77823bab66f21f4b3c907f176ff04cc5dd2459406dc9268b0aa1635fab8958dcd7ebb812f27615472802d00fa7771ac5652708af6aea37e262", 0xf6, 0xfffffffffffffffe}, {&(0x7f0000000300)="71f0b3a561b3a9f557bcd231a7a3f1610c06519fe14116f47952d61e8c00862e3f74df006b3d782c94768f713510c25290767add872c6349a65a4b", 0x3b, 0x3a}, {&(0x7f0000000340)="172c53015d76749aadac3583f7e9d0231a4a627e424b23234e612a89863b30b50816e72d53ed0221b89f078d965c4480ed18588564d1b24c01e46d01c01b2f0ad7e439be63a665a179ce640ee311da8b313820d80ba9dfd6ade2aeb776a92eac36615529", 0x64, 0x10001}, {&(0x7f00000003c0)="493d378505bcda1b0ddfbe04b8936af35673721eeb057fee3c79d721edde979060b76ddaa6bfab13b6366381993a358cb07317ac0227232c60b73e55a58de8651c3921fbacc3336a77e26560d3e345418a1d57b1e3323971505be1c9b51af14563b7c314f9a73dc9445a31d19372102b18e1e59839d9aa1bc184120830ba5fe970dd102ba102a12be8607b9a56c5b674348b35dbadc59d20d6540bc7855fa6c56c45183ab9e4c7e7e2c9bea472342cd3a0c7c269941e8836b16a004eec26db1c1ef0ce817f1da600e1f2cddaa37810c967589dbf5978ae84d4b6326029b8e587f6d05273c8ec1f38a52596444adfdeac9cd605a8", 0xf4, 0x5}, {&(0x7f00000004c0)="99685168e57be3684993bff2316c83d526d6d4ab976300", 0x17}], 0x4001, &(0x7f00000005c0)=ANY=[@ANYBLOB='check=strict,uid=', @ANYRESHEX=r1, @ANYBLOB=',check=relaxed,m>p=normal,\x00']) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2000, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 15:01:39 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x8) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 434.215050] hfs: can't find a HFS filesystem on dev loop3 15:01:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x0, &(0x7f0000000540)) 15:01:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000fff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfffffffd, &(0x7f0000000240)) 15:01:39 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x101001) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast2, @in=@remote, 0x4e21, 0x400, 0x4e20, 0xfffffffffffff177, 0xa, 0xa0, 0x0, 0x0, 0x0, r3}, {0x0, 0xfffffffffffffffa, 0xa9825ba, 0xff, 0x800, 0x800, 0x401, 0x2}, {0x7, 0x0, 0xb958, 0x9}, 0x553c647a, 0x6e6bbb, 0x1, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3, 0x33}, 0xa, @in=@remote, 0x3501, 0x5, 0x3, 0xe6, 0x80000000, 0xb6, 0xffffffffffffffc0}}, 0xe8) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 15:01:40 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='\nfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x0, &(0x7f0000000540)) 15:01:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfdfdffff00000000, &(0x7f0000000240)) 15:01:40 executing program 6: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) r0 = dup(0xffffffffffffff9c) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000180)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80, 0x0) symlinkat(&(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00') getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xde, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) faccessat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x140, 0x800) 15:01:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:40 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x10000, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000100)={0xfffffffffffffc01, 0x7, 0xfffffffffffffff7}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) open_by_handle_at(r1, &(0x7f0000000200)={0xb3, 0x0, "fde29f1c870e4a9338c04e2346bf588436d0a64a775703ec50eb9d9bf43cb2112ee3f2696ed9e4f54a5b002217ab525f571b42b1082933e467479b41dd150b982db5cf4950407b96ecb15955e2a72416dcca32c6a620aa4e7904366a3abea4854895a0628fb12c5e6ce44577a6a0778f3f29856e9354b8d90294c29f9f0df595e5b26b9bd8c1f3d20167deed3e2dd26179a247092b6217e9859401119cea7be825cc8b81b34803b90d58ba"}, 0x2880) [ 434.960447] FAULT_INJECTION: forcing a failure. [ 434.960447] name failslab, interval 1, probability 0, space 0, times 0 [ 434.971789] CPU: 0 PID: 25206 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 434.980298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.989668] Call Trace: [ 434.992268] dump_stack+0x1c9/0x2b4 [ 434.995910] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.001141] ? perf_trace_lock+0xde/0x920 [ 435.005312] should_fail.cold.4+0xa/0x11 [ 435.009398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.014515] ? __save_stack_trace+0x8d/0xf0 [ 435.018865] ? save_stack+0x43/0xd0 [ 435.022503] ? kasan_kmalloc+0xc4/0xe0 [ 435.026414] ? find_held_lock+0x36/0x1c0 [ 435.030516] ? check_same_owner+0x340/0x340 [ 435.034849] ? rcu_note_context_switch+0x680/0x680 [ 435.039790] ? kmem_cache_alloc_node+0x217/0x720 [ 435.044564] __should_failslab+0x124/0x180 [ 435.048818] should_failslab+0x9/0x14 [ 435.052630] kmem_cache_alloc_node_trace+0x259/0x720 [ 435.057759] __kmalloc_node_track_caller+0x33/0x70 [ 435.062895] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 435.067702] __alloc_skb+0x155/0x770 [ 435.071445] ? skb_scrub_packet+0x490/0x490 [ 435.075779] ? netlink_insert+0x15d/0x3f0 [ 435.079943] ? __netlink_insert+0x13d0/0x13d0 [ 435.084525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.090075] ? netlink_autobind.isra.34+0x23b/0x320 [ 435.095246] netlink_sendmsg+0xb29/0xfc0 [ 435.099326] ? netlink_unicast+0x760/0x760 [ 435.103569] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 435.108509] ? apparmor_socket_sendmsg+0x29/0x30 [ 435.113286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.118855] ? security_socket_sendmsg+0x94/0xc0 [ 435.123631] ? netlink_unicast+0x760/0x760 [ 435.127882] sock_sendmsg+0xd5/0x120 [ 435.131610] ___sys_sendmsg+0x7fd/0x930 [ 435.135602] ? copy_msghdr_from_user+0x580/0x580 [ 435.140369] ? lock_downgrade+0x8f0/0x8f0 [ 435.144545] ? proc_fail_nth_write+0x9e/0x210 [ 435.149057] ? __fget_light+0x2f7/0x440 [ 435.153045] ? fget_raw+0x20/0x20 [ 435.156503] ? find_held_lock+0x36/0x1c0 [ 435.160578] ? kasan_check_write+0x14/0x20 [ 435.164819] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 435.169758] ? wait_for_completion+0x8d0/0x8d0 [ 435.174362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 435.179917] ? sockfd_lookup_light+0xc5/0x160 [ 435.184436] __sys_sendmsg+0x11d/0x290 [ 435.188331] ? __ia32_sys_shutdown+0x80/0x80 [ 435.192751] ? __sb_end_write+0xac/0xe0 [ 435.196734] ? fput+0x130/0x1a0 [ 435.200022] ? do_syscall_64+0x9a/0x820 [ 435.204000] ? do_syscall_64+0x9a/0x820 [ 435.207989] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 435.213104] ? ksys_ioctl+0x81/0xd0 [ 435.216741] __x64_sys_sendmsg+0x78/0xb0 [ 435.220814] do_syscall_64+0x1b9/0x820 [ 435.224709] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 435.230170] ? syscall_return_slowpath+0x5e0/0x5e0 [ 435.235112] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 435.240150] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 435.245174] ? recalc_sigpending_tsk+0x180/0x180 [ 435.249938] ? kasan_check_write+0x14/0x20 [ 435.254225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.259099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.264297] RIP: 0033:0x457099 [ 435.267497] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 435.286409] RSP: 002b:00007fa80a676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 435.294127] RAX: ffffffffffffffda RBX: 00007fa80a6776d4 RCX: 0000000000457099 [ 435.301411] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 435.308689] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 435.315963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 435.323241] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000001 15:01:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x200000000000000, &(0x7f0000000240)) 15:01:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180), 0x0, 0xde3}]) 15:01:40 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000000)={0x3, 0x802, 0x7}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='%fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:40 executing program 5: perf_event_open(&(0x7f0000000180)={0xfffffffffffffffe, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:40 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 435.569974] Dev loop7: unable to read RDB block 13 [ 435.575105] loop7: unable to read partition table [ 435.697695] FAULT_INJECTION: forcing a failure. [ 435.697695] name failslab, interval 1, probability 0, space 0, times 0 [ 435.709262] CPU: 0 PID: 25249 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 435.717770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.727136] Call Trace: [ 435.729751] dump_stack+0x1c9/0x2b4 [ 435.733409] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.733999] loop7: partition table beyond EOD, [ 435.738618] ? print_usage_bug+0xc0/0xc0 [ 435.738646] ? perf_trace_lock+0xde/0x920 [ 435.738684] should_fail.cold.4+0xa/0x11 [ 435.743379] truncated [ 435.747436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.747471] ? graph_lock+0x170/0x170 [ 435.747504] ? mark_held_locks+0x160/0x160 [ 435.751684] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) [ 435.755706] ? perf_trace_lock+0xde/0x920 [ 435.755726] ? find_held_lock+0x36/0x1c0 [ 435.755747] ? __lock_is_held+0xb5/0x140 [ 435.790805] ? check_same_owner+0x340/0x340 [ 435.795146] ? rcu_note_context_switch+0x680/0x680 [ 435.800105] __should_failslab+0x124/0x180 [ 435.804360] should_failslab+0x9/0x14 [ 435.808195] kmem_cache_alloc_trace+0x2b5/0x730 [ 435.812887] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 435.818357] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 435.823921] xfrm_policy_alloc+0xd9/0x480 [ 435.828095] ? xfrm_policy_destroy+0xc0/0xc0 [ 435.832534] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 435.838094] ? apparmor_capable+0x351/0x6c0 [ 435.842464] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 435.848027] xfrm_policy_construct+0x2f/0x650 [ 435.852549] xfrm_add_policy+0x20f/0x750 [ 435.856635] ? xfrm_policy_construct+0x650/0x650 [ 435.861433] ? validate_nla+0x7b0/0x7b0 [ 435.865437] ? ns_capable+0x22/0x30 [ 435.869098] ? __netlink_ns_capable+0x100/0x130 [ 435.873814] ? xfrm_policy_construct+0x650/0x650 [ 435.878593] xfrm_user_rcv_msg+0x455/0x8b0 [ 435.882848] ? xfrm_dump_sa_done+0xf0/0xf0 [ 435.887124] ? lock_downgrade+0x8f0/0x8f0 [ 435.891343] ? __sanitizer_cov_trace_cmp4+0x16/0x20 15:01:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x500000000000000, &(0x7f0000000240)) 15:01:41 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') sendmsg$netlink(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40000000}, 0xc, &(0x7f0000000040)=[{&(0x7f0000000140)={0x68, 0x2d, 0x400, 0x70bd25, 0x25dfdbfd, "", [@nested={0x58, 0x47, [@generic="f652f85c3c10367737ccc070ec8f27254a5a24fb6f7b1c0d072c894c826049067be00328ee5eb3de11cd610294dbe9f0fbc8f6652a65bbbf1d5229fc19f3dc379269d6876c3a", @typed={0xc, 0x58, @u64=0x6}]}]}, 0x68}, {&(0x7f00000002c0)={0x140, 0x3b, 0x1, 0x70bd2a, 0x25dfdbfc, "", [@nested={0xc0, 0x2a, [@generic="37d340d5002f5f222eddf6c1335e31a88b549ab4c73af960d62cb9c648e2520ce6d71f538590a8b29154e8bfcc8e76140841633d572e5bedba45e6765840ee19085822c66f659500caa984bb570734c7052311b58596bb924aafadcb4aba58eac72efdee5d57098e83abccd2983754eaa398d1bd0bb6d99f2dc9e9b1d63944140abc2853a3e9719952a145189d2f4d614a614d4d91a7b983ffd638e510f7c8109e678f2269b103622cf28a174bcdf85a9d3809354e7d1423b6"]}, @generic="c91382f36caebe783f51280e2f04a047f9c4aa03f639e8cb4df189e49139eb71100196bf2bfedded09e6a99cb630632496a99dd18d264730beccf648f602ad1700ff71f9b31c5e047573e971bb9c952d8fd166e704b7a960819131633521923bcf16f3161f93", @typed={0x8, 0x1, @fd=r0}]}, 0x140}], 0x2, 0x0, 0x0, 0x40811}, 0x4000000) 15:01:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x1) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000200)="8f6592ae1347ad2c006f09bf020fc1ef6abbd1aeeee5e253e83ead67964c577f9d288ca89e25dd0a9b4a37571c0f270e2c0b12d3c0b11a2c74a92fa801814e31f2538cc4ef334ed97e2dd5f191e909e93e347c90c313199d4109b8ee68443467c9be1eee12ef7ec25627b7b34ff2f28b8509731c0113db112db2d824498643d9f3091878388fcc35fa072dba9429727e0ac6b1032acbb6cb1ceac4b12412fa98178792e0f3a9f7458911ef3a5a2a80c22b607f2e0f330ad5919411dcc9d4c1e67aac47dc25d1549a9128fa48db1ad6d0a39356cb49f5438c50d288c058") write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffff5000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 435.896469] netlink_rcv_skb+0x172/0x440 [ 435.900561] ? xfrm_dump_sa_done+0xf0/0xf0 [ 435.904814] ? netlink_ack+0xbe0/0xbe0 [ 435.908737] xfrm_netlink_rcv+0x6f/0x90 [ 435.912730] netlink_unicast+0x5a0/0x760 [ 435.916816] ? netlink_attachskb+0x9a0/0x9a0 [ 435.921248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.926813] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 435.931872] netlink_sendmsg+0xa18/0xfc0 [ 435.935977] ? netlink_unicast+0x760/0x760 [ 435.940240] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 435.945203] ? apparmor_socket_sendmsg+0x29/0x30 [ 435.949988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.955786] ? security_socket_sendmsg+0x94/0xc0 [ 435.960570] ? netlink_unicast+0x760/0x760 [ 435.964832] sock_sendmsg+0xd5/0x120 [ 435.968584] ___sys_sendmsg+0x7fd/0x930 [ 435.972599] ? copy_msghdr_from_user+0x580/0x580 [ 435.977407] ? lock_downgrade+0x8f0/0x8f0 [ 435.981588] ? proc_fail_nth_write+0x9e/0x210 [ 435.986115] ? __fget_light+0x2f7/0x440 [ 435.990125] ? fget_raw+0x20/0x20 [ 435.993616] ? find_held_lock+0x36/0x1c0 [ 435.997705] ? kasan_check_write+0x14/0x20 [ 436.001961] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 436.006915] ? wait_for_completion+0x8d0/0x8d0 [ 436.011532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.017083] ? sockfd_lookup_light+0xc5/0x160 [ 436.021607] __sys_sendmsg+0x11d/0x290 [ 436.025536] ? __ia32_sys_shutdown+0x80/0x80 [ 436.029960] ? __sb_end_write+0xac/0xe0 [ 436.033960] ? fput+0x130/0x1a0 [ 436.037265] ? do_syscall_64+0x9a/0x820 [ 436.041262] ? do_syscall_64+0x9a/0x820 15:01:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e24, 0x6, @loopback, 0x4}, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x1e}, 0x7}, 0x1fffe0000000, [0xf0, 0xc9, 0x101, 0x200, 0x2, 0xfffffffffffff2bd, 0x401, 0x800]}, 0x5c) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 436.045258] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 436.050380] ? ksys_ioctl+0x81/0xd0 [ 436.054035] __x64_sys_sendmsg+0x78/0xb0 [ 436.058121] do_syscall_64+0x1b9/0x820 [ 436.062055] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 436.067442] ? syscall_return_slowpath+0x5e0/0x5e0 [ 436.072407] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 436.077532] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 436.082563] ? recalc_sigpending_tsk+0x180/0x180 [ 436.087339] ? kasan_check_write+0x14/0x20 [ 436.091598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.096852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.102058] RIP: 0033:0x457099 [ 436.105259] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.124160] RSP: 002b:00007fa80a676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 436.131879] RAX: ffffffffffffffda RBX: 00007fa80a6776d4 RCX: 0000000000457099 [ 436.139154] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 436.146429] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 436.153700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 436.160970] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000002 15:01:41 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x4000, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180), 0x0, 0xde3}]) 15:01:41 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x1}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x4, 0x5, 0x0, 0xffffffff}, 0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x33) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000300)="de455da9021b1ac89b204119610828e1e6295cb4079dbdae8a24925ba295b7a2697b3d75f8fe8315cbed4616f3d7bdf5fc98b4d91f413dcb20105ada5c7160b247a9bdaef743a1ef09bffd0e7713deed5a13615d183151ec", 0x58) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000002c0)=r0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) 15:01:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='h%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4800000000000000, &(0x7f0000000240)) 15:01:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffdfd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:41 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 436.445213] Dev loop7: unable to read RDB block 13 [ 436.450407] loop7: unable to read partition table [ 436.516549] loop7: partition table beyond EOD, truncated [ 436.522217] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) [ 436.580313] FAULT_INJECTION: forcing a failure. [ 436.580313] name failslab, interval 1, probability 0, space 0, times 0 [ 436.591973] CPU: 1 PID: 25312 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 436.600482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.609850] Call Trace: [ 436.612464] dump_stack+0x1c9/0x2b4 [ 436.616124] ? dump_stack_print_info.cold.2+0x52/0x52 [ 436.621358] should_fail.cold.4+0xa/0x11 [ 436.625466] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.630597] ? perf_trace_lock+0xde/0x920 [ 436.634763] ? print_usage_bug+0xc0/0xc0 [ 436.638850] ? __debug_object_init+0x581/0x12e0 [ 436.643548] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 436.648677] ? zap_class+0x740/0x740 [ 436.652434] ? find_held_lock+0x36/0x1c0 [ 436.656533] ? print_usage_bug+0xc0/0xc0 [ 436.660614] ? graph_lock+0x170/0x170 [ 436.664440] ? print_usage_bug+0xc0/0xc0 [ 436.668530] ? mark_held_locks+0xc9/0x160 [ 436.672711] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 436.677840] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 436.682977] ? __lock_acquire+0x7fc/0x5020 [ 436.687242] ? print_usage_bug+0xc0/0xc0 [ 436.691321] ? mark_held_locks+0xc9/0x160 [ 436.695500] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 436.700637] __should_failslab+0x124/0x180 [ 436.704897] should_failslab+0x9/0x14 [ 436.708721] kmem_cache_alloc_node+0x56/0x720 [ 436.713243] ? mark_held_locks+0xc9/0x160 [ 436.717425] __alloc_skb+0x119/0x770 [ 436.721175] ? lockdep_hardirqs_on+0x421/0x5c0 [ 436.725785] ? skb_scrub_packet+0x490/0x490 15:01:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) socketpair(0x3, 0x80007, 0x3, &(0x7f0000001700)={0xffffffffffffffff}) socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000001740)=@assoc_id=0x0, &(0x7f0000001780)=0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x5}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100)={r4, 0x3}, 0x8) 15:01:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7400000000000000, &(0x7f0000000240)) 15:01:42 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="f96a4a6382f91d8c4901ee65e32b55b5117b89dd") ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000080)={0x10}) [ 436.730133] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 436.735277] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 436.740433] ? note_gp_changes+0x420/0x420 [ 436.744703] ? debug_object_init_on_stack+0x20/0x20 [ 436.749754] xfrm_send_policy_notify+0x897/0x18b0 [ 436.754622] ? refcount_sub_and_test_checked+0x21a/0x350 [ 436.760106] ? xfrm_send_acquire+0xc00/0xc00 [ 436.764547] ? lock_acquire+0x1e4/0x4f0 [ 436.768551] ? xfrm_timer_handler+0xcc0/0xcc0 [ 436.773085] ? kasan_check_read+0x11/0x20 [ 436.777254] ? rcu_is_watching+0x8c/0x150 15:01:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180), 0x0, 0xde3}]) [ 436.781433] ? xfrm_policy_insert+0x79d/0x16d0 [ 436.786061] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 436.790756] ? xfrm_send_acquire+0xc00/0xc00 [ 436.795193] km_policy_notify+0x1a2/0x340 [ 436.799371] ? xfrm_timer_handler+0xcc0/0xcc0 [ 436.803897] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 436.809457] ? memcpy+0x45/0x50 [ 436.812756] ? copy_from_user_policy+0x110/0x2b0 [ 436.817541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.823106] xfrm_add_policy+0x4e3/0x750 [ 436.827204] ? xfrm_policy_construct+0x650/0x650 [ 436.831981] ? validate_nla+0x7b0/0x7b0 [ 436.835974] ? ns_capable+0x22/0x30 [ 436.839627] ? __netlink_ns_capable+0x100/0x130 [ 436.844318] ? xfrm_policy_construct+0x650/0x650 [ 436.849094] xfrm_user_rcv_msg+0x455/0x8b0 [ 436.853351] ? xfrm_dump_sa_done+0xf0/0xf0 [ 436.857618] ? lock_downgrade+0x8f0/0x8f0 [ 436.861790] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 436.866870] netlink_rcv_skb+0x172/0x440 [ 436.870951] ? xfrm_dump_sa_done+0xf0/0xf0 [ 436.875211] ? netlink_ack+0xbe0/0xbe0 [ 436.879130] xfrm_netlink_rcv+0x6f/0x90 [ 436.883134] netlink_unicast+0x5a0/0x760 [ 436.887231] ? netlink_attachskb+0x9a0/0x9a0 [ 436.891660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.897222] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 436.902270] netlink_sendmsg+0xa18/0xfc0 [ 436.906361] ? netlink_unicast+0x760/0x760 [ 436.910623] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 436.915577] ? apparmor_socket_sendmsg+0x29/0x30 [ 436.920359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.925931] ? security_socket_sendmsg+0x94/0xc0 [ 436.930703] ? netlink_unicast+0x760/0x760 [ 436.934958] sock_sendmsg+0xd5/0x120 [ 436.938692] ___sys_sendmsg+0x7fd/0x930 [ 436.942692] ? copy_msghdr_from_user+0x580/0x580 [ 436.947472] ? lock_downgrade+0x8f0/0x8f0 [ 436.951815] ? proc_fail_nth_write+0x9e/0x210 [ 436.956338] ? __fget_light+0x2f7/0x440 [ 436.960337] ? fget_raw+0x20/0x20 [ 436.963800] ? find_held_lock+0x36/0x1c0 [ 436.967876] ? kasan_check_write+0x14/0x20 [ 436.972128] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 436.977073] ? wait_for_completion+0x8d0/0x8d0 [ 436.981678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.987221] ? sockfd_lookup_light+0xc5/0x160 [ 436.991726] __sys_sendmsg+0x11d/0x290 [ 436.995623] ? __ia32_sys_shutdown+0x80/0x80 [ 437.000040] ? __sb_end_write+0xac/0xe0 [ 437.004026] ? fput+0x130/0x1a0 [ 437.007315] ? do_syscall_64+0x9a/0x820 [ 437.011297] ? do_syscall_64+0x9a/0x820 [ 437.015286] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 437.020404] ? ksys_ioctl+0x81/0xd0 [ 437.024044] __x64_sys_sendmsg+0x78/0xb0 [ 437.028116] do_syscall_64+0x1b9/0x820 [ 437.032017] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 437.037402] ? syscall_return_slowpath+0x5e0/0x5e0 [ 437.042340] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 437.047367] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 437.052407] ? recalc_sigpending_tsk+0x180/0x180 [ 437.057180] ? kasan_check_write+0x14/0x20 [ 437.061886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.066749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.071940] RIP: 0033:0x457099 [ 437.075138] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.094048] RSP: 002b:00007fa80a676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 437.101767] RAX: ffffffffffffffda RBX: 00007fa80a6776d4 RCX: 0000000000457099 [ 437.109041] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 437.116311] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 437.123582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 437.130856] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000003 [ 437.166629] Dev loop7: unable to read RDB block 13 [ 437.171747] loop7: unable to read partition table [ 437.202062] loop7: partition table beyond EOD, truncated [ 437.207649] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x20900) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000100)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 15:01:42 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0x33, "9cd282263c3621595058349f9eec878d0ab14c8663d6c91c83e909e2bc87771632e828d0fb7836c179be70b36273bf5a2e53fc"}, &(0x7f0000000300)=0x3b) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000340)={0x7, 0x0, 0x2, 0xfffffffffffffffe, 0x1, 0x7, 0x5, 0x1, r1}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x3, 0x5, 0x4, 0x9, 0xffc0000000000000, 0x8821, 0x9, 0x1, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r2, 0x4}, &(0x7f0000000180)=0x8) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x28000, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0x7, 0x223000000, 0x7f}) 15:01:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xe909000000000000, &(0x7f0000000240)) 15:01:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='h.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e", 0xf, 0xde3}]) 15:01:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00680000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 437.488527] Dev loop7: unable to read RDB block 13 [ 437.493754] loop7: unable to read partition table 15:01:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 15:01:42 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x101081, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {r1, r2/1000+10000}}, 0x100) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4c00000000000000, &(0x7f0000000240)) [ 437.622770] loop7: partition table beyond EOD, truncated [ 437.628452] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:43 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='h/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) flock(r0, 0x7) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 15:01:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e", 0xf, 0xde3}]) 15:01:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000000, &(0x7f0000000240)) 15:01:43 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00100100000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 438.123382] FAULT_INJECTION: forcing a failure. [ 438.123382] name failslab, interval 1, probability 0, space 0, times 0 [ 438.134709] CPU: 1 PID: 25457 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 438.143216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.152585] Call Trace: [ 438.155206] dump_stack+0x1c9/0x2b4 [ 438.158867] ? dump_stack_print_info.cold.2+0x52/0x52 [ 438.164097] should_fail.cold.4+0xa/0x11 [ 438.168182] ? __kernel_text_address+0xd/0x40 15:01:43 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'gretap0\x00', 0x3}, 0x18) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) fsync(r0) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x8001) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 438.172708] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.177842] ? __save_stack_trace+0x8d/0xf0 [ 438.182212] ? save_stack+0xa9/0xd0 [ 438.185870] ? save_stack+0x43/0xd0 [ 438.189521] ? kasan_kmalloc+0xc4/0xe0 [ 438.193430] ? kasan_slab_alloc+0x12/0x20 [ 438.197596] ? kmem_cache_alloc_node+0x144/0x720 [ 438.202372] ? __alloc_skb+0x119/0x770 [ 438.206302] ? xfrm_send_policy_notify+0x897/0x18b0 [ 438.211344] ? km_policy_notify+0x1a2/0x340 [ 438.215702] ? xfrm_add_policy+0x4e3/0x750 [ 438.219962] ? xfrm_user_rcv_msg+0x455/0x8b0 [ 438.224410] ? netlink_rcv_skb+0x172/0x440 [ 438.228669] ? xfrm_netlink_rcv+0x6f/0x90 [ 438.232844] ? netlink_unicast+0x5a0/0x760 [ 438.237102] ? netlink_sendmsg+0xa18/0xfc0 [ 438.241355] ? sock_sendmsg+0xd5/0x120 [ 438.245272] ? ___sys_sendmsg+0x7fd/0x930 [ 438.249439] ? __sys_sendmsg+0x11d/0x290 [ 438.253515] ? __x64_sys_sendmsg+0x78/0xb0 [ 438.257773] ? do_syscall_64+0x1b9/0x820 [ 438.261862] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.267253] ? print_usage_bug+0xc0/0xc0 15:01:43 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1004}}, 0x20) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x80000101081, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000380)=[{0x3d, 0x0, [0x7ff, 0x6, 0x4, 0x2, 0x8, 0x4, 0x4, 0x7ff, 0x3ff, 0x4, 0x0, 0x9, 0x4, 0x97be, 0x1ff, 0x52]}, {0x21, 0x0, [0x245, 0x7ff, 0x6c2, 0x100000000, 0x4, 0x0, 0x4b6a, 0x6, 0x3, 0x7, 0x100000001, 0x101, 0x80, 0x4, 0x8, 0xc00000000]}], r1, 0x1, 0x1, 0x90}}, 0x20) [ 438.271348] ? mark_held_locks+0xc9/0x160 [ 438.275537] ? graph_lock+0x170/0x170 [ 438.279369] ? mark_held_locks+0xc9/0x160 [ 438.283556] ? kmem_cache_alloc_node+0x217/0x720 [ 438.288343] __should_failslab+0x124/0x180 [ 438.292619] should_failslab+0x9/0x14 [ 438.296447] kmem_cache_alloc_node_trace+0x5a/0x720 [ 438.301501] __kmalloc_node_track_caller+0x33/0x70 [ 438.306460] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 438.311244] __alloc_skb+0x155/0x770 [ 438.314975] ? lockdep_hardirqs_on+0x421/0x5c0 [ 438.319582] ? skb_scrub_packet+0x490/0x490 15:01:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800) write$cgroup_subtree(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x19) [ 438.323932] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 438.329053] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 438.334201] ? note_gp_changes+0x420/0x420 [ 438.338458] ? debug_object_init_on_stack+0x20/0x20 [ 438.343503] xfrm_send_policy_notify+0x897/0x18b0 [ 438.348419] ? refcount_sub_and_test_checked+0x21a/0x350 [ 438.353897] ? xfrm_send_acquire+0xc00/0xc00 [ 438.358330] ? lock_acquire+0x1e4/0x4f0 [ 438.362329] ? xfrm_timer_handler+0xcc0/0xcc0 [ 438.366854] ? kasan_check_read+0x11/0x20 [ 438.371021] ? rcu_is_watching+0x8c/0x150 [ 438.375198] ? xfrm_policy_insert+0x79d/0x16d0 [ 438.379803] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 438.384504] ? xfrm_send_acquire+0xc00/0xc00 [ 438.388934] km_policy_notify+0x1a2/0x340 [ 438.393112] ? xfrm_timer_handler+0xcc0/0xcc0 [ 438.397656] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 438.403212] ? memcpy+0x45/0x50 [ 438.406515] ? copy_from_user_policy+0x110/0x2b0 [ 438.411282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.416831] xfrm_add_policy+0x4e3/0x750 [ 438.420906] ? xfrm_policy_construct+0x650/0x650 [ 438.425674] ? validate_nla+0x7b0/0x7b0 [ 438.429651] ? ns_capable+0x22/0x30 [ 438.433292] ? __netlink_ns_capable+0x100/0x130 [ 438.437973] ? xfrm_policy_construct+0x650/0x650 [ 438.442738] xfrm_user_rcv_msg+0x455/0x8b0 [ 438.446985] ? xfrm_dump_sa_done+0xf0/0xf0 [ 438.451230] ? lock_downgrade+0x8f0/0x8f0 [ 438.455383] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 438.460466] netlink_rcv_skb+0x172/0x440 [ 438.464533] ? xfrm_dump_sa_done+0xf0/0xf0 [ 438.468780] ? netlink_ack+0xbe0/0xbe0 [ 438.472686] xfrm_netlink_rcv+0x6f/0x90 [ 438.476670] netlink_unicast+0x5a0/0x760 [ 438.480749] ? netlink_attachskb+0x9a0/0x9a0 [ 438.485172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.490718] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 438.495747] netlink_sendmsg+0xa18/0xfc0 [ 438.499825] ? netlink_unicast+0x760/0x760 [ 438.504071] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 438.509009] ? apparmor_socket_sendmsg+0x29/0x30 [ 438.513774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.519319] ? security_socket_sendmsg+0x94/0xc0 [ 438.524084] ? netlink_unicast+0x760/0x760 [ 438.528330] sock_sendmsg+0xd5/0x120 [ 438.532051] ___sys_sendmsg+0x7fd/0x930 [ 438.536042] ? copy_msghdr_from_user+0x580/0x580 [ 438.540806] ? lock_downgrade+0x8f0/0x8f0 [ 438.544965] ? proc_fail_nth_write+0x9e/0x210 [ 438.549477] ? __fget_light+0x2f7/0x440 [ 438.553460] ? fget_raw+0x20/0x20 [ 438.556915] ? find_held_lock+0x36/0x1c0 [ 438.560989] ? kasan_check_write+0x14/0x20 [ 438.565230] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 438.570175] ? wait_for_completion+0x8d0/0x8d0 [ 438.574778] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.580323] ? sockfd_lookup_light+0xc5/0x160 [ 438.584827] __sys_sendmsg+0x11d/0x290 [ 438.588724] ? __ia32_sys_shutdown+0x80/0x80 [ 438.593138] ? __sb_end_write+0xac/0xe0 [ 438.597132] ? fput+0x130/0x1a0 [ 438.600433] ? do_syscall_64+0x9a/0x820 [ 438.604422] ? do_syscall_64+0x9a/0x820 [ 438.608419] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 438.613533] ? ksys_ioctl+0x81/0xd0 [ 438.617179] __x64_sys_sendmsg+0x78/0xb0 [ 438.621249] do_syscall_64+0x1b9/0x820 [ 438.625145] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 438.630524] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.635464] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 438.640486] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 438.645509] ? recalc_sigpending_tsk+0x180/0x180 [ 438.650271] ? kasan_check_write+0x14/0x20 [ 438.654523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.659382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.664584] RIP: 0033:0x457099 [ 438.667787] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.686694] RSP: 002b:00007fa80a676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 438.694430] RAX: ffffffffffffffda RBX: 00007fa80a6776d4 RCX: 0000000000457099 [ 438.701706] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 438.708976] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 438.716246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 438.723518] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000004 [ 438.740496] Dev loop7: unable to read RDB block 13 [ 438.745572] loop7: unable to read partition table 15:01:44 executing program 6: r0 = getpgid(0xffffffffffffffff) setpriority(0x1, r0, 0x64) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') 15:01:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='h\ns\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20100000, &(0x7f0000000240)) 15:01:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 438.944729] loop7: partition table beyond EOD, truncated [ 438.950415] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:44 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)="7370ffff65742e6d656d7300", 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100), 0x0) 15:01:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4000, &(0x7f0000000240)) 15:01:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837", 0x16, 0xde3}]) 15:01:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 439.265379] Dev loop7: unable to read RDB block 13 [ 439.270490] loop7: unable to read partition table [ 439.329109] FAULT_INJECTION: forcing a failure. [ 439.329109] name failslab, interval 1, probability 0, space 0, times 0 [ 439.340483] CPU: 1 PID: 25537 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 439.348990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.358356] Call Trace: [ 439.360977] dump_stack+0x1c9/0x2b4 [ 439.364433] loop7: partition table beyond EOD, truncated [ 439.364630] ? dump_stack_print_info.cold.2+0x52/0x52 15:01:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x500, &(0x7f0000000240)) [ 439.364656] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 439.370210] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) [ 439.375316] should_fail.cold.4+0xa/0x11 [ 439.375343] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.375367] ? alloc_skb_with_frags+0x7d0/0x7d0 [ 439.401564] ? __wake_up_common+0x7b0/0x7b0 [ 439.405907] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 439.410945] ? netlink_trim+0x1ba/0x380 [ 439.414949] ? rcu_read_lock_sched_held+0x108/0x120 [ 439.420003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.425562] ? netlink_broadcast_filtered+0x7e5/0x1620 [ 439.430871] ? __netlink_sendskb+0xd0/0xd0 [ 439.435137] ? graph_lock+0x170/0x170 [ 439.438966] ? memcpy+0x45/0x50 [ 439.442255] ? __nla_put+0x37/0x40 [ 439.445811] __should_failslab+0x124/0x180 [ 439.450055] should_failslab+0x9/0x14 [ 439.453862] kmem_cache_alloc_node+0x56/0x720 [ 439.458381] __alloc_skb+0x119/0x770 [ 439.462117] ? xfrm_send_policy_notify+0x9cd/0x18b0 [ 439.467160] ? skb_scrub_packet+0x490/0x490 [ 439.471488] ? xfrm_send_acquire+0xc00/0xc00 [ 439.475915] ? lock_acquire+0x1e4/0x4f0 [ 439.479902] ? xfrm_timer_handler+0xcc0/0xcc0 [ 439.484439] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 439.489642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.495261] ? pfkey_xfrm_policy2msg_size+0x208/0x260 [ 439.500492] pfkey_xfrm_policy2msg_prep+0x29/0x50 [ 439.505348] pfkey_send_policy_notify+0x6ba/0x950 [ 439.510201] ? pfkey_sendmsg+0x1060/0x1060 [ 439.514444] km_policy_notify+0x1a2/0x340 [ 439.518606] ? xfrm_timer_handler+0xcc0/0xcc0 [ 439.523110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 439.528657] ? memcpy+0x45/0x50 [ 439.531949] ? copy_from_user_policy+0x110/0x2b0 [ 439.536736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.542287] xfrm_add_policy+0x4e3/0x750 [ 439.546358] ? xfrm_policy_construct+0x650/0x650 [ 439.551134] ? validate_nla+0x7b0/0x7b0 [ 439.555117] ? ns_capable+0x22/0x30 [ 439.558759] ? __netlink_ns_capable+0x100/0x130 [ 439.563440] ? xfrm_policy_construct+0x650/0x650 [ 439.568201] xfrm_user_rcv_msg+0x455/0x8b0 [ 439.572446] ? xfrm_dump_sa_done+0xf0/0xf0 [ 439.576693] ? lock_downgrade+0x8f0/0x8f0 [ 439.580847] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 439.585914] netlink_rcv_skb+0x172/0x440 [ 439.589987] ? xfrm_dump_sa_done+0xf0/0xf0 [ 439.594230] ? netlink_ack+0xbe0/0xbe0 [ 439.598139] xfrm_netlink_rcv+0x6f/0x90 [ 439.602133] netlink_unicast+0x5a0/0x760 [ 439.606216] ? netlink_attachskb+0x9a0/0x9a0 [ 439.610637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.616190] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 439.621218] netlink_sendmsg+0xa18/0xfc0 [ 439.625295] ? netlink_unicast+0x760/0x760 [ 439.629544] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 439.634485] ? apparmor_socket_sendmsg+0x29/0x30 [ 439.639259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.644804] ? security_socket_sendmsg+0x94/0xc0 [ 439.649570] ? netlink_unicast+0x760/0x760 [ 439.653818] sock_sendmsg+0xd5/0x120 [ 439.657544] ___sys_sendmsg+0x7fd/0x930 [ 439.661537] ? copy_msghdr_from_user+0x580/0x580 [ 439.666300] ? lock_downgrade+0x8f0/0x8f0 [ 439.670464] ? proc_fail_nth_write+0x9e/0x210 [ 439.674970] ? __fget_light+0x2f7/0x440 [ 439.678957] ? fget_raw+0x20/0x20 [ 439.682423] ? find_held_lock+0x36/0x1c0 [ 439.686500] ? kasan_check_write+0x14/0x20 [ 439.690743] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 439.695685] ? wait_for_completion+0x8d0/0x8d0 [ 439.700290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 439.705831] ? sockfd_lookup_light+0xc5/0x160 [ 439.710341] __sys_sendmsg+0x11d/0x290 [ 439.714236] ? __ia32_sys_shutdown+0x80/0x80 [ 439.718651] ? __sb_end_write+0xac/0xe0 [ 439.722641] ? fput+0x130/0x1a0 [ 439.725934] ? do_syscall_64+0x9a/0x820 [ 439.729917] ? do_syscall_64+0x9a/0x820 [ 439.733910] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 439.739024] ? ksys_ioctl+0x81/0xd0 [ 439.742664] __x64_sys_sendmsg+0x78/0xb0 [ 439.746738] do_syscall_64+0x1b9/0x820 [ 439.750633] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 439.756006] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.760943] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 439.765968] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 439.770988] ? recalc_sigpending_tsk+0x180/0x180 [ 439.775750] ? kasan_check_write+0x14/0x20 [ 439.779996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.784859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.790055] RIP: 0033:0x457099 [ 439.793255] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.812162] RSP: 002b:00007fa80a676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 439.819883] RAX: ffffffffffffffda RBX: 00007fa80a6776d4 RCX: 0000000000457099 15:01:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x1, 0x18000) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000200)=""/4096) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) sync_file_range(r0, 0x1, 0x2, 0x4) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2d, 'io'}, {0x2d, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'pids'}, {0x2e, 'pids'}, {0x2f, 'pids'}, {0x2f, 'rdma'}]}, 0x26) [ 439.827167] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 439.834443] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 439.841711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 439.849022] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000005 15:01:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000740000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837", 0x16, 0xde3}]) 15:01:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x700, &(0x7f0000000240)) 15:01:45 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x4, 0x4) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000280)={0x0, 0x1c7, &(0x7f00000003c0)="9a58f60ce1526f01739e68b13747df4cf2dbbad8e3fd23104075d02c439457d24d8dda72b766b2e67ddc8f9f52148dd82ecd96f212403b42fa003eeb4202f5d4deecaa730c4e9543c118a67c551b20f3eb0cd5dcd8"}) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x6, 0x2) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000440)={0x0, 0x0, 0x2080}) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x6) writev(r0, &(0x7f0000000280), 0xd555e5e59cf9761) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') poll(&(0x7f00000001c0)=[{r0, 0x8182}, {r0, 0x261}, {r0, 0x100}, {r0, 0x28e}], 0x4, 0x3f) 15:01:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="1c1eeea00a5944020280ffde0bbb9a51bb08a887636b46c68b16898bb1bee06a0de547dcd406b80b1d39dcc536dcc5014affe948e8ab38168a8984530e7db661d6cd855f1ddb6a905d10492374f9455aa59bc4c60ae544821563b26b71757356cdac005bad4a", 0x66}], 0x1) [ 440.055197] Dev loop7: unable to read RDB block 13 [ 440.060784] loop7: unable to read partition table 15:01:45 executing program 1 (fault-call:3 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 440.136174] loop7: partition table beyond EOD, truncated [ 440.141856] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000030000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfffffdfd, &(0x7f0000000240)) 15:01:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="73440233877e2e026c3773c4169663ce", 0x10}], 0x1, &(0x7f0000000180)}, 0x0) io_setup(0x7ff, &(0x7f0000000f40)=0x0) io_submit(r3, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000340), 0x87}]) r4 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080), 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000080)) 15:01:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837", 0x16, 0xde3}]) 15:01:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffffb0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 440.562106] Dev loop7: unable to read RDB block 13 [ 440.567234] loop7: unable to read partition table 15:01:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4c, &(0x7f0000000240)) 15:01:46 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200200b02, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x1ff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000000)={0xa, 0x8, 0x0, 0x80}, 0xa) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x4df) 15:01:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) mq_timedsend(r2, &(0x7f0000000100)="dbb38b962bff0f810fdfa03dbe76aa2732253c2cb5b531df8b69d1c0cdea2cc3db8227400f58f451b55abdc23e458604703ea44f23f2ee074bb329a74f6cbbea923a09fb9135135c930cb3cc4774c871b402253d9249cd96458c29c530b406aad81001e440e8f2226942d2c731b78a45c93b1d219853", 0x76, 0x900, &(0x7f0000000240)={r3, r4+10000000}) r5 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r6 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r6) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000380)={'veth1\x00', 0x26}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") [ 440.627844] loop7: partition table beyond EOD, truncated [ 440.633802] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) [ 440.703684] FAULT_INJECTION: forcing a failure. [ 440.703684] name failslab, interval 1, probability 0, space 0, times 0 [ 440.715110] CPU: 0 PID: 25643 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 440.723618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.732985] Call Trace: [ 440.735595] dump_stack+0x1c9/0x2b4 [ 440.739255] ? dump_stack_print_info.cold.2+0x52/0x52 [ 440.744487] should_fail.cold.4+0xa/0x11 [ 440.748567] ? __kernel_text_address+0xd/0x40 [ 440.753096] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 440.758226] ? __save_stack_trace+0x8d/0xf0 [ 440.762590] ? save_stack+0xa9/0xd0 [ 440.766239] ? save_stack+0x43/0xd0 [ 440.769904] ? kasan_kmalloc+0xc4/0xe0 [ 440.773851] ? kasan_slab_alloc+0x12/0x20 [ 440.778055] ? kmem_cache_alloc_node+0x144/0x720 [ 440.782867] ? __alloc_skb+0x119/0x770 [ 440.786807] ? pfkey_xfrm_policy2msg_prep+0x29/0x50 [ 440.791845] ? pfkey_send_policy_notify+0x6ba/0x950 [ 440.796883] ? km_policy_notify+0x1a2/0x340 [ 440.801244] ? xfrm_add_policy+0x4e3/0x750 [ 440.805509] ? xfrm_user_rcv_msg+0x455/0x8b0 [ 440.809971] ? netlink_rcv_skb+0x172/0x440 [ 440.814228] ? xfrm_netlink_rcv+0x6f/0x90 [ 440.818406] ? netlink_unicast+0x5a0/0x760 [ 440.822676] ? netlink_sendmsg+0xa18/0xfc0 [ 440.826934] ? sock_sendmsg+0xd5/0x120 [ 440.830842] ? ___sys_sendmsg+0x7fd/0x930 [ 440.835025] ? __sys_sendmsg+0x11d/0x290 [ 440.839105] ? __x64_sys_sendmsg+0x78/0xb0 [ 440.843369] ? do_syscall_64+0x1b9/0x820 [ 440.847466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.852882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.858452] ? netlink_broadcast_filtered+0x7e5/0x1620 [ 440.863755] ? graph_lock+0x170/0x170 [ 440.867581] ? mark_held_locks+0xc9/0x160 [ 440.871759] ? kmem_cache_alloc_node+0x217/0x720 [ 440.876546] __should_failslab+0x124/0x180 [ 440.880828] should_failslab+0x9/0x14 [ 440.884660] kmem_cache_alloc_node_trace+0x5a/0x720 [ 440.889732] __kmalloc_node_track_caller+0x33/0x70 [ 440.894713] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 440.899497] __alloc_skb+0x155/0x770 15:01:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 440.903230] ? xfrm_send_policy_notify+0x9cd/0x18b0 [ 440.908354] ? skb_scrub_packet+0x490/0x490 [ 440.912710] ? xfrm_send_acquire+0xc00/0xc00 [ 440.917152] ? lock_acquire+0x1e4/0x4f0 [ 440.921150] ? xfrm_timer_handler+0xcc0/0xcc0 [ 440.925691] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 440.930907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.936467] ? pfkey_xfrm_policy2msg_size+0x208/0x260 [ 440.941686] pfkey_xfrm_policy2msg_prep+0x29/0x50 [ 440.946551] pfkey_send_policy_notify+0x6ba/0x950 15:01:46 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) fcntl$addseals(r0, 0x409, 0x8) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=r1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000)={0x8c, 0x1}, 0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f00000002c0)=""/204) [ 440.951425] ? pfkey_sendmsg+0x1060/0x1060 [ 440.955938] km_policy_notify+0x1a2/0x340 [ 440.960120] ? xfrm_timer_handler+0xcc0/0xcc0 [ 440.964640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 440.970238] ? memcpy+0x45/0x50 [ 440.973575] ? copy_from_user_policy+0x110/0x2b0 [ 440.978352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.983922] xfrm_add_policy+0x4e3/0x750 [ 440.987991] ? xfrm_policy_construct+0x650/0x650 [ 440.992766] ? validate_nla+0x7b0/0x7b0 [ 440.996765] ? ns_capable+0x22/0x30 [ 441.000414] ? __netlink_ns_capable+0x100/0x130 [ 441.005107] ? xfrm_policy_construct+0x650/0x650 [ 441.009879] xfrm_user_rcv_msg+0x455/0x8b0 [ 441.014136] ? xfrm_dump_sa_done+0xf0/0xf0 [ 441.018381] ? lock_downgrade+0x8f0/0x8f0 [ 441.022543] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 441.027616] netlink_rcv_skb+0x172/0x440 [ 441.031705] ? xfrm_dump_sa_done+0xf0/0xf0 [ 441.035954] ? netlink_ack+0xbe0/0xbe0 [ 441.039869] xfrm_netlink_rcv+0x6f/0x90 [ 441.043860] netlink_unicast+0x5a0/0x760 [ 441.047944] ? netlink_attachskb+0x9a0/0x9a0 [ 441.052357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.057896] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 441.063128] netlink_sendmsg+0xa18/0xfc0 [ 441.067203] ? netlink_unicast+0x760/0x760 [ 441.071449] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 441.076385] ? apparmor_socket_sendmsg+0x29/0x30 [ 441.081169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.086713] ? security_socket_sendmsg+0x94/0xc0 [ 441.091488] ? netlink_unicast+0x760/0x760 [ 441.095730] sock_sendmsg+0xd5/0x120 [ 441.099448] ___sys_sendmsg+0x7fd/0x930 [ 441.103445] ? copy_msghdr_from_user+0x580/0x580 [ 441.108210] ? lock_downgrade+0x8f0/0x8f0 [ 441.112352] ? proc_fail_nth_write+0x9e/0x210 [ 441.116840] ? __fget_light+0x2f7/0x440 [ 441.120811] ? fget_raw+0x20/0x20 [ 441.124262] ? find_held_lock+0x36/0x1c0 [ 441.128332] ? kasan_check_write+0x14/0x20 [ 441.132566] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 441.137489] ? wait_for_completion+0x8d0/0x8d0 [ 441.142070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 441.147597] ? sockfd_lookup_light+0xc5/0x160 [ 441.152087] __sys_sendmsg+0x11d/0x290 [ 441.155974] ? __ia32_sys_shutdown+0x80/0x80 [ 441.160400] ? __sb_end_write+0xac/0xe0 [ 441.164399] ? fput+0x130/0x1a0 [ 441.167702] ? do_syscall_64+0x9a/0x820 [ 441.171686] ? do_syscall_64+0x9a/0x820 [ 441.175680] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 441.180791] ? ksys_ioctl+0x81/0xd0 [ 441.184427] __x64_sys_sendmsg+0x78/0xb0 [ 441.188481] do_syscall_64+0x1b9/0x820 [ 441.192372] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 441.197751] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.202675] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 441.207698] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 441.212706] ? recalc_sigpending_tsk+0x180/0x180 [ 441.217454] ? kasan_check_write+0x14/0x20 [ 441.221696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.226553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.231747] RIP: 0033:0x457099 [ 441.234934] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.253830] RSP: 002b:00007fa80a634c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 441.261545] RAX: ffffffffffffffda RBX: 00007fa80a6356d4 RCX: 0000000000457099 [ 441.268818] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 441.276092] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 441.283373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 441.290673] R13: 00000000004d4c20 R14: 00000000004c915b R15: 0000000000000006 15:01:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f65", 0x1a, 0xde3}]) 15:01:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000004c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:46 executing program 1 (fault-call:3 fault-nth:7): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1020, &(0x7f0000000240)) 15:01:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:46 executing program 6: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8800, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) socket$netlink(0x10, 0x3, 0x4) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 441.581088] Dev loop7: unable to read RDB block 13 [ 441.586309] loop7: unable to read partition table [ 441.620045] loop7: partition table beyond EOD, truncated 15:01:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x65, 0x100) ioctl$RTC_AIE_ON(r2, 0x7001) openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x0) [ 441.625693] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfdfdffff, &(0x7f0000000240)) 15:01:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363affffff97000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4), 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f65", 0x1a, 0xde3}]) 15:01:47 executing program 6: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000400)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x40000000, &(0x7f0000000240)) 15:01:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00050000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) r2 = semget$private(0x0, 0x3, 0x281) semctl$GETPID(r2, 0x2, 0xb, &(0x7f0000000100)=""/108) [ 442.075703] Dev loop7: unable to read RDB block 13 [ 442.080844] loop7: unable to read partition table 15:01:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x200c0000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 442.131115] loop7: partition table beyond EOD, truncated [ 442.136814] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:47 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000140)="fc8fa153aac0b4e1fc937d4d9a7287b9a41aa4736c416295e703b266bed6495bb1c58742b19704203691399f7b53d945ebefd5b676b236705879a35e323f3b1b6d8060b07ee43fb96c5771d818f3f4ea89041c9136d47d14a37aad910449df2aaf477c125cafd177cb8bd5bef006042f69e93c6a8d9cb98e39cd8e89a957e3d3589f79f804f86e6c93fb7d3050d92ebbeba770e7c717970e1e7275e72b7d1ac0364dea69f097814f") r1 = semget$private(0x0, 0x1, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000440)={0x1, 'vlan0\x00', 0x4}, 0x18) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000003c0)={{0x18, r2, r3, r4, r5, 0x4, 0xe9}, 0x3, 0xfff, 0x6}) symlinkat(&(0x7f0000000500)='./file0\x00', r0, &(0x7f0000000540)='./file0\x00') 15:01:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f65", 0x1a, 0xde3}]) 15:01:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6000000, &(0x7f0000000240)) 15:01:47 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) fsync(r0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 15:01:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) poll(&(0x7f0000000240)=[{r2, 0x1000}, {r0, 0x2}, {r2}], 0x3, 0x7ff) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x6) ioctl$KDSKBLED(r3, 0x4b65, 0x8) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="2dad696f202f70696496a10bb14859b743a79c"], 0xf) 15:01:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a09e90000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 442.502360] Dev loop7: unable to read RDB block 13 [ 442.507477] loop7: unable to read partition table 15:01:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x2c0}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 442.600014] loop7: partition table beyond EOD, truncated [ 442.605645] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfcfdffff00000000, &(0x7f0000000240)) 15:01:48 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x10000, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000080)="0b0900f5000319", 0x7}], 0x10000000000000e0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000040)) truncate(&(0x7f0000000000)='./file0\x00', 0x80) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000140)={0x9, 0x6}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000200)={0x714b, 0x7fff, 0x2, 0x7}, 0x10) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000240)=0x8) 15:01:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xfffffffffffff000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e", 0x1c, 0xde3}]) 15:01:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2010000000000000, &(0x7f0000000240)) 15:01:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:48 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000040), 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 443.053125] Dev loop7: unable to read RDB block 13 [ 443.058307] loop7: unable to read partition table 15:01:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x4000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a48000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 443.156117] loop7: partition table beyond EOD, truncated [ 443.161763] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x81, 0x400480) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xedc0, &(0x7f0000000240)) 15:01:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:48 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x40, 0x109000) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e", 0x1c, 0xde3}]) 15:01:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afdfdffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf0}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xd53, 0x4000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @multicast1}, 0x41a8}, @in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @multicast1}, 0xfffffffffffffffd}, @in6={0xa, 0x4e21, 0x1ff, @mcast2, 0x5}, @in6={0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x13}, 0x67}], 0x80) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 15:01:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000000000, &(0x7f0000000240)) 15:01:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 443.666961] Dev loop7: unable to read RDB block 13 [ 443.672136] loop7: unable to read partition table 15:01:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:49 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f0000000140)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00') [ 443.780520] loop7: partition table beyond EOD, truncated [ 443.786182] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000003f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f00000003c0)=[r2, r3, r4, r5]) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:49 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x2, 0x11) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x939}}}, &(0x7f0000000000)=0x84) r2 = shmget$private(0x0, 0x4000, 0x400, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/175) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000040)=r1, 0x4) 15:01:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x400000000000000, &(0x7f0000000240)) 15:01:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e", 0x1c, 0xde3}]) 15:01:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x6006}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:49 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000100)={0x1}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x801, 0x0) socketpair(0x2, 0x80806, 0x3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'io'}, {0x2f, 'pids'}, {0x2b, 'pids'}, {0x2b, 'cpu'}]}, 0xfffffffffffffd1b) [ 444.292311] Dev loop7: unable to read RDB block 13 [ 444.297439] loop7: unable to read partition table 15:01:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf6ffffff, &(0x7f0000000240)) 15:01:49 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x200, 0x11) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 444.395762] loop7: partition table beyond EOD, truncated [ 444.401447] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffffd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d}]) 15:01:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3f000000, &(0x7f0000000240)) 15:01:50 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0a0900f500f819", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x3000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a7fffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d}]) 15:01:50 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f00000002c0)="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", 0x7}], 0x1bf) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xa0000, 0x88) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) socketpair$inet6(0xa, 0x5, 0x1, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) utimensat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x0, 0x2710}, {0x0, 0x7530}}, 0x100) io_setup(0xf10, &(0x7f0000000080)=0x0) r4 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7fffffff, 0x400) io_cancel(r3, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, r1, &(0x7f0000000480)="178a43a739c58ac4750ea3e7484b5c9b23d66f4c81a35392a771f975dffb9748125e5f79dbce633ce76b1323d18fde7dab4ad62fa26e539f9cb70196aac20cc6ea3c6edc295836447071b8f5142766640c2856129d8a2ab0a021225a94f16e65d73575fa3504d513805aee5a6db64833d633b1d008facc3d00512f2b043bd976459add67301e9db0fda75270ec61df6be6fe6688d7658f067b67f7c1437593d028fec84245002dd0f89a6feeaaecb76465a689b18fa1b4478cc72797338964d45255301619c1a0bfd41b8592be", 0xcd, 0x3, 0x0, 0xfc394b97e0684ab4, r4}, &(0x7f0000000300)) 15:01:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4c00, &(0x7f0000000240)) 15:01:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xfffffffc}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:50 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 15:01:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363affffffffffffff7f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d}]) 15:01:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000, &(0x7f0000000240)) 15:01:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf00000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:50 executing program 5: syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffff, 0x8000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:50 executing program 6: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x400000, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000340)) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x80, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e24, 0xffffffffffffff7f, @loopback}, {0xa, 0x4e24, 0x8000, @remote, 0x100000000}, 0x9, [0xe6, 0x5, 0xbd, 0xe72, 0x10001, 0x7, 0x0, 0xffff]}, 0x5c) userfaultfd(0x800) syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x1ff, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000380)={0x200, 0xb5, "96904a13c96feb0f1b91be92367516694d345cde34423201362799609cebcf3c87326402e90fd953d83034b6f946fda3d4b7661a1496ee7503281f5a0b8b14cf6400887fe42b987f8e6a9ca9e14ec5b0b1daacfd3c327380f01fa20eeeb53368accbe7bbcadaf94717f130d0911ec7274ca377c8dcede9268e6e922c6bb919eec46f859fbf70a1133c02ae56f9f435ef1ae7520bbaf427aa6bac12860595a767b556d553f2c7d3a06438ebdc85d7acf26daaa7570d"}) 15:01:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffff40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3, &(0x7f0000000240)) 15:01:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x7802000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x84000) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000300)={0x5, 0x1000, 0x0, 0x0, 0x8}) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x4040, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000280)={0xff, @broadcast, 0x4e21, 0x3, 'wrr\x00', 0x20, 0x9, 0x6}, 0x2c) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40402, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000100)='irlan0\x00') ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000200)) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000240)) 15:01:51 executing program 6: r0 = memfd_create(&(0x7f0000000040)='[\'selinux-\x00', 0x3) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000001c0)=0x1) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000140)=0x1) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x28000, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000000)="0b0900f5000319", 0x7}], 0x1) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0x7, 0x30, 0x1, r1}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000040000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hf\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6, &(0x7f0000000240)) 15:01:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xffffff7f00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:51 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:01:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'io'}, {0x2b, 'pids'}]}, 0xa) 15:01:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000008000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xc0ed0000, &(0x7f0000000240)) 15:01:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x80ffffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 446.508440] hfs: can't find a HFS filesystem on dev loop3 15:01:51 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101085, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1007}}, 0x20) fsetxattr(r0, &(0x7f0000000140)=@random={'user.', '/dev/rfkill\x00'}, &(0x7f0000000180)='/dev/rfkill\x00', 0xc, 0x1) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x0, {0xcd2, 0x10000, "63a1a64154df934b1e1597634d436f917ade43e20531eaba2e0e42e197d1d40f3fa3d9c259e99ca4c37ebabdccc42b0dbf108a3bef389a7a16afa87b21b3c3a8424912c2e7746970d687bca607878810c8174df2025cf35d346af8309f41ed0073b09e929d496462dd89c3aac50c60f52a6905902412d1e514fb754c4216d93a9d296774685df3990a41037aab7f4d5c8629f64eb9a2e6dc8f20799b39d91687698a4a1a9329311bae6c750043878500a7233676c6d294c946df49bb0384439c52dea93bcf6c68428db6c78fd9ea16dde6119a3377676d71af866b8b2a1c8cf97e808f91297a8857f5e1f0f6df3569f8bb61de041c21f49eec57be302761e9e2", 0xa6, 0x8, 0x6, 0x0, 0x9, 0x1ff, 0x9, 0x1}, r1}}, 0x128) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfdffffff00000000, &(0x7f0000000240)) 15:01:52 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) io_setup(0x8, &(0x7f00000002c0)=0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x80100, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x62, 0xff, 0xec7, 0x4}, &(0x7f00000004c0)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000500)={r5, 0x81}, 0x8) io_pgetevents(r3, 0x5, 0x3, &(0x7f0000000300)=[{}, {}, {}], &(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000400)={&(0x7f00000003c0)={0x101}, 0x8}) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) r6 = getpgid(0x0) r7 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x6, 0x104c1) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000240)={0x9, {0x2, 0x4e20, @loopback}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e23, @rand_addr=0x81}, 0x10, 0x3, 0x1, 0x1, 0x3, 0x0, 0xfffffffffffffffd, 0xffffffffffff8000, 0x2}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xda, 0x1ff, 0x5, 0x3f, 0x0, 0x79, 0x40, 0x2, 0x0, 0x2, 0x7ff, 0x80000000, 0x7fffffff, 0x5, 0xffffffff, 0x0, 0x10001, 0x401, 0x0, 0x9, 0x7fffffff, 0x8, 0x80000000, 0x7, 0x168c, 0x8, 0x1, 0xffffffffffffff81, 0x3ff8, 0x0, 0x5, 0x4f6b, 0x7, 0x7, 0x856a, 0x800000, 0x0, 0x1, 0x7, @perf_bp={&(0x7f0000000080), 0x4}, 0x4000, 0x23e7, 0x5, 0x5, 0x8, 0xb7, 0x2}, r6, 0xf, r0, 0x8) 15:01:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 446.848466] hfs: can't find a HFS filesystem on dev loop3 15:01:52 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x4081, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000240)={0xf, 0x1f, 0x2, 0x6}, 0xf) write$P9_RSYMLINK(r0, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x43, 0x4, 0x7}}, 0x14) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x4, 0x3, 0xfffffffffffff635, 0x8170, 0x0, 0x1f, 0x8000, 0xf, 0x2, 0x7, 0xffd8, 0x6, 0x1, 0x9, 0x9, 0x21, 0x9, 0xffffffffffffff51, 0x400, 0xffff, 0x0, 0x6, 0xb42f, 0x101, 0x100000001, 0x9, 0x1, 0x87, 0x3, 0x4, 0x0, 0xbd, 0x100000000, 0x0, 0xf11e, 0x6, 0x0, 0x7, 0x7, @perf_bp={&(0x7f00000000c0), 0xa}, 0x8, 0x8000, 0x3, 0x3, 0x8000, 0xcd, 0x9}, r2, 0xc, r1, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)="daa6a36015803b0eefab3b5cfd2c46581e8e1ed309062010d7abe261d623af78f1c9ee1ddbd2b814f8268ea683bedf770d33b5cffa148d30e9776d9bf18a8f5ec680a49aca4f5e0950f5181e3726793eedf3445c15130c8bf7979837f1a68f625538007d49b9297b72e8cd959d4761a0e99cf095e589f7ad8fe22675f1a9ea147f26d677aec09ddf99635a52260e5a45c8ef28ccfd9b74faff39ee2d09b51e5086278093dfce0889e965e1a1bd7a72c8681dd16b1d5f91cb9c719243253242d42724600dd6c9add4716e0cd61b0bf7e3d05839f0114dc0d064d623b222162800000000000000000000", 0xe9}], 0x1, 0x8) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0xff, 0x12, 0x2, 0x10, "906ab83eebd31ad1075a1ee44e5aeeed67fb16c4a9f3901305012884f9e2900b89b464bc478a2be2a3073c9bbcd1513e34df1afcef273d49990c858b7404efe0", "3ac61611b67c01be164f19495d8585850a0e05bde7c638018e533fb7a0714eee", [0x80]}) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) 15:01:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf0ffffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x8cffffff, &(0x7f0000000240)) 15:01:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a20100000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:52 executing program 7: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101085, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1007}}, 0x20) fsetxattr(r0, &(0x7f0000000140)=@random={'user.', '/dev/rfkill\x00'}, &(0x7f0000000180)='/dev/rfkill\x00', 0xc, 0x1) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x0, {0xcd2, 0x10000, "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", 0xa6, 0x8, 0x6, 0x0, 0x9, 0x1ff, 0x9, 0x1}, r1}}, 0x128) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) r2 = dup2(r1, r1) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18, 0x0, 0x5, {0x10001}}, 0x18) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r3, 0x706, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xad04}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 447.247592] hfs: can't find a HFS filesystem on dev loop3 15:01:52 executing program 6: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x509001, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000140)=0x1, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101000, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3ff, 0x800) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000180)) accept$alg(r1, 0x0, 0x0) 15:01:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x78020000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)) 15:01:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000060000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) r2 = semget$private(0x0, 0x3, 0x281) semctl$GETPID(r2, 0x2, 0xb, &(0x7f0000000100)=""/108) 15:01:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) [ 447.579110] hfs: can't find a HFS filesystem on dev loop3 15:01:53 executing program 6: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x101085, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xffffff9e}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000230000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfdffffff, &(0x7f0000000240)) 15:01:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="73440233877e2e026c3773c4169663ce", 0x10}], 0x1, &(0x7f0000000180)}, 0x0) io_setup(0x7ff, &(0x7f0000000f40)=0x0) io_submit(r3, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000340), 0x87}]) r4 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080), 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000080)) 15:01:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) ioctl(r0, 0x2, &(0x7f0000000100)="6fafcc212b407fb0694d65d649c6680daf63c78c023d3ccf776ad205baa60d2c3a9175fd7381b5da899dbb8bfb2433a49c87ba4c6b37e1b802b712bfc26447b5169d24540a36439cf705c0d109b1c58b3c81028b11c64cec37893c77c96498f5efe5f37dff0ca4ae6dde896de270036636ace6df98d58af60464e71cafba8bdef95148eb4486170c315c4be0be83c91169432b49b76c991bef34cfb2c69cf46222b28d63e1cecbee") socket$inet_dccp(0x2, 0x6, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:53 executing program 6: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) flock(r0, 0xe) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf0ffffffffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x5000000, &(0x7f0000000240)) [ 448.039209] hfs: can't find a HFS filesystem on dev loop3 15:01:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afcfdffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)="6370757365742e6d656d6f7a795f731a58089da910d28a000000", 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x18000, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)=0x1) 15:01:53 executing program 6: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x8000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x8001) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xfcffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3f00, &(0x7f0000000240)) 15:01:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000007a0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) socket$l2tp(0x18, 0x1, 0x1) r3 = dup3(r1, r0, 0x80000) recvfrom$inet6(r3, &(0x7f0000000200)=""/137, 0x89, 0x40000040, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x1b}, 0x1}, 0x1c) [ 448.413774] hfs: can't find a HFS filesystem on dev loop3 15:01:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x489d6a10dd3538f8, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 448.709084] hfs: can't find a HFS filesystem on dev loop3 15:01:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'memory'}, {0x0, 'memory'}, {0x2f, 'memory'}, {0x2b, "696f48df1e423a2bd5e6bf8fd33dfce608ae5c22e16972fc8462db2c3999a7e90d39af58d9609af8ac8740f68786e9758f9c8615b653d7dde96e61ab93f12ec1cf869f70b80b2dca1103f71e2485f0e3bf6339f4b936026b6928c063fe904f4982d0d07d74b428f0cc9c1d95e66956ba44e311bb1017ffa035e4da5ba8964f70eb93129f0f26734ae007461b16cb031acb33c6894c383c41a66d8b1ead0700a6a46b14f47da62e0d44df7dd0b302283d7b32d5225ac12602b396dfde7d697520f286b71a2817201f4022456ff54b72ec2d4269fe"}, {0x2b, 'pids'}, {0x2d, 'memory'}, {0x0, 'rdma'}, {0x2b, 'rdma'}]}, 0x108) 15:01:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000010200000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:54 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10107f, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x68, &(0x7f0000000240)) 15:01:54 executing program 7 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x26702, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140)=0x9) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x110, r1, 0x0) write$P9_RWRITE(r2, &(0x7f0000000200)={0xb, 0x77, 0x2, 0x9db}, 0xb) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x600200, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) [ 449.119969] FAULT_INJECTION: forcing a failure. [ 449.119969] name failslab, interval 1, probability 0, space 0, times 0 [ 449.131418] CPU: 0 PID: 26580 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 449.139942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.149299] Call Trace: [ 449.151908] dump_stack+0x1c9/0x2b4 [ 449.155560] ? dump_stack_print_info.cold.2+0x52/0x52 [ 449.160784] should_fail.cold.4+0xa/0x11 [ 449.164879] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 449.170035] ? lock_downgrade+0x8f0/0x8f0 [ 449.174207] ? proc_fail_nth_write+0x9e/0x210 [ 449.178725] ? proc_cwd_link+0x1d0/0x1d0 [ 449.182811] ? find_held_lock+0x36/0x1c0 [ 449.186909] ? check_same_owner+0x340/0x340 [ 449.191260] ? rcu_note_context_switch+0x680/0x680 [ 449.196216] __should_failslab+0x124/0x180 [ 449.200487] should_failslab+0x9/0x14 [ 449.204307] __kmalloc+0x2b2/0x720 [ 449.207867] ? strncpy_from_user+0x510/0x510 [ 449.212296] ? fput+0x130/0x1a0 [ 449.215590] ? do_syscall_64+0x9a/0x820 [ 449.219580] ? __x64_sys_memfd_create+0x142/0x4f0 [ 449.224477] ? do_syscall_64+0x9a/0x820 [ 449.228473] __x64_sys_memfd_create+0x142/0x4f0 [ 449.233177] ? memfd_fcntl+0x1580/0x1580 [ 449.237254] ? ksys_ioctl+0x81/0xd0 [ 449.240909] do_syscall_64+0x1b9/0x820 [ 449.244828] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 449.250255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 449.255207] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 449.260255] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 449.265291] ? recalc_sigpending_tsk+0x180/0x180 [ 449.270063] ? kasan_check_write+0x14/0x20 [ 449.274342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.279214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.284430] RIP: 0033:0x457099 [ 449.287646] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.306555] RSP: 002b:00007fbec30dfa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 15:01:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000007fffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xffffff80}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3f00000000000000, &(0x7f0000000240)) [ 449.314251] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000457099 [ 449.321506] RDX: 0000000020000558 RSI: 0000000000000000 RDI: 00000000004c25ce [ 449.328759] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 449.336011] R10: 0000000020000558 R11: 0000000000000246 R12: 0000000000001bc6 [ 449.343261] R13: 00000000004d76f8 R14: 00000000004c25ce R15: 0000000000000000 15:01:54 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000000)={0x8}) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 449.515677] hfs: can't find a HFS filesystem on dev loop3 15:01:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7a00000000000000, &(0x7f0000000240)) 15:01:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffff6000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYRESDEC=r1], 0x14) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x1000, 0x101, 0x4, 0x6, 0x0, 0x400, 0x0, 0x1, 0x80000001, 0x20, 0x9, 0x81, 0x7ff, 0x7, 0x2, 0x1000, 0x9, 0xfffffffffffffffe, 0xd5, 0x0, 0x1, 0x800, 0x4, 0x80000, 0x8, 0x3, 0x37, 0xffffffff, 0x8, 0x6, 0x8, 0x0, 0x2, 0x55, 0x1ff, 0x7, 0x0, 0x8, 0x0, @perf_config_ext={0x3, 0x42a6}, 0x80, 0x401, 0xfffffffffffffffc, 0x6, 0x0, 0x2, 0xffffffff80000001}, r1, 0xd, r0, 0x0) 15:01:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xfcffffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:55 executing program 6: r0 = msgget$private(0x0, 0x80) msgrcv(r0, &(0x7f0000000080)={0x0, ""/23}, 0x1f, 0x0, 0x1000) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0xa0875aaf1b833823, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="4628f557f02b2ec9ffa10984d6a65209ee30de96c0ada1732cba9fbbf221d013a9a9d2b04e216c452d85fea722ef967ab47e953610f9d50e37f83cbafc78b7d7129317f95d5e28458c04d3a98cebc4f6b6d5b1987c61be270388ed42b0297a0053235f4e99577ad12ee079aec515892e2fb0f9f6f81ac98fc3b77b9fb3badb748b46f7006d0a7d638e8e9b23579ff4f3a2823cb5595aa62e44a3e19f7d", 0x9d}], 0x1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x101085, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000002c0)=0xfe6) 15:01:55 executing program 7 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 449.834251] print_req_error: I/O error, dev loop0, sector 128 15:01:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 449.936081] hfs: can't find a HFS filesystem on dev loop3 15:01:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a7a000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x300000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x100000000000000, &(0x7f0000000240)) [ 450.061525] FAULT_INJECTION: forcing a failure. [ 450.061525] name failslab, interval 1, probability 0, space 0, times 0 [ 450.072929] CPU: 1 PID: 26666 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 450.081551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.090914] Call Trace: [ 450.093566] dump_stack+0x1c9/0x2b4 [ 450.097209] ? dump_stack_print_info.cold.2+0x52/0x52 [ 450.102422] ? perf_trace_lock+0xde/0x920 [ 450.106592] should_fail.cold.4+0xa/0x11 [ 450.110670] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 450.115786] ? find_held_lock+0x36/0x1c0 [ 450.119956] ? __lock_acquire+0x7fc/0x5020 [ 450.124199] ? lock_downgrade+0x8f0/0x8f0 [ 450.128356] ? find_held_lock+0x36/0x1c0 [ 450.132488] ? check_same_owner+0x340/0x340 [ 450.136820] ? rcu_note_context_switch+0x680/0x680 [ 450.141757] ? find_held_lock+0x36/0x1c0 [ 450.145832] __should_failslab+0x124/0x180 [ 450.150083] should_failslab+0x9/0x14 [ 450.153898] kmem_cache_alloc+0x29c/0x710 [ 450.158057] ? lock_downgrade+0x8f0/0x8f0 [ 450.162220] ? shmem_destroy_callback+0xc0/0xc0 [ 450.166903] shmem_alloc_inode+0x1b/0x40 [ 450.170975] alloc_inode+0x63/0x190 [ 450.174636] new_inode_pseudo+0x71/0x1a0 [ 450.178707] ? prune_icache_sb+0x1c0/0x1c0 [ 450.182956] ? _raw_spin_unlock+0x22/0x30 [ 450.187129] new_inode+0x1c/0x40 [ 450.190507] shmem_get_inode+0xf1/0x910 [ 450.194488] ? shmem_encode_fh+0x340/0x340 [ 450.198725] ? lock_downgrade+0x8f0/0x8f0 [ 450.202881] ? lock_release+0x9f0/0x9f0 [ 450.206871] ? check_same_owner+0x340/0x340 [ 450.211207] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 450.216233] ? __check_object_size+0xa3/0x5d7 [ 450.220747] __shmem_file_setup.part.45+0x83/0x2a0 [ 450.225686] shmem_file_setup+0x65/0x90 [ 450.229675] __x64_sys_memfd_create+0x2af/0x4f0 [ 450.234352] ? memfd_fcntl+0x1580/0x1580 [ 450.238439] ? ksys_ioctl+0x81/0xd0 [ 450.242093] do_syscall_64+0x1b9/0x820 [ 450.245990] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 450.251365] ? syscall_return_slowpath+0x5e0/0x5e0 [ 450.256313] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 450.261349] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 450.266364] ? recalc_sigpending_tsk+0x180/0x180 [ 450.271133] ? kasan_check_write+0x14/0x20 [ 450.275380] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 450.280277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.285470] RIP: 0033:0x457099 [ 450.288669] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:01:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 450.307577] RSP: 002b:00007fbec30dfa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 450.315327] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000457099 [ 450.322621] RDX: 0000000020000558 RSI: 0000000000000000 RDI: 00000000004c25ce [ 450.329894] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 450.337172] R10: 0000000020000558 R11: 0000000000000246 R12: 0000000000001bc6 [ 450.344440] R13: 00000000004d76f8 R14: 00000000004c25ce R15: 0000000000000001 15:01:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x300000000000000, &(0x7f0000000240)) 15:01:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8001, 0x141000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000100)={0xffffffffffffffff, 0xd20, 0x8209, 0x1ff, 0x5, 0x81, 0x7, 0x5, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={r3, 0x1ea9, 0x20}, &(0x7f0000000240)=0xc) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 450.498410] hfs: can't find a HFS filesystem on dev loop3 15:01:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x80ffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7000000, &(0x7f0000000240)) 15:01:56 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@ipv4={[], [], @multicast2}, @remote, @mcast2, 0x9, 0xfffffffffffffffc, 0x3, 0x100, 0x8, 0x4440100, r1}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00') ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000140)={0x9, 0x0, [{0x3bd, 0x0, 0x7}, {0xbbf, 0x0, 0x1}, {0xbff, 0x0, 0x4}, {0x250, 0x0, 0x7e69}, {0xbff, 0x0, 0x6}, {0x40000bf2, 0x0, 0xffffffff}, {0x98e, 0x0, 0x1}, {0x186, 0x0, 0x9b8e}, {0xc00110ab, 0x0, 0x6}]}) [ 450.711947] hfs: can't find a HFS filesystem on dev loop3 15:01:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001280)='/dev/full\x00', 0x40, 0x0) getsockname$inet6(r1, &(0x7f00000012c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000001300)=0x1c) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000001340)=0xffffffffffffffff, 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x1000, "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"}, &(0x7f0000000100)=0x1008) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r3, 0x1, 0x30, 0x3, 0xffffffff}, &(0x7f0000001240)=0x18) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 15:01:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x14000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:56 executing program 7 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363af6ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:56 executing program 6: r0 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0xdee, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)="79248b1b54a6e89996106d7353e1bf7273179a55f48590f60b1c57a9ecdbc8b980087890f7503a572c9805af96ebb5d0479e4ab7ddaa4c95c51e1531749573376868", 0x42}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000200)) 15:01:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4800, &(0x7f0000000240)) 15:01:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x6006000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 451.107170] hfs: can't find a HFS filesystem on dev loop3 15:01:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) 15:01:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7400, &(0x7f0000000240)) [ 451.228969] FAULT_INJECTION: forcing a failure. [ 451.228969] name failslab, interval 1, probability 0, space 0, times 0 [ 451.240273] CPU: 1 PID: 26777 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 451.248780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.258194] Call Trace: [ 451.260811] dump_stack+0x1c9/0x2b4 [ 451.264470] ? dump_stack_print_info.cold.2+0x52/0x52 [ 451.269745] should_fail.cold.4+0xa/0x11 [ 451.273875] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 451.279007] ? mark_held_locks+0x160/0x160 [ 451.283260] ? __kernel_text_address+0xd/0x40 [ 451.287772] ? unwind_get_return_address+0x61/0xa0 [ 451.292735] ? find_held_lock+0x36/0x1c0 [ 451.296837] ? check_same_owner+0x340/0x340 [ 451.301181] ? rcu_note_context_switch+0x680/0x680 [ 451.306130] __should_failslab+0x124/0x180 [ 451.310429] should_failslab+0x9/0x14 [ 451.314239] kmem_cache_alloc+0x29c/0x710 [ 451.318421] ? mpol_shared_policy_init+0x235/0x670 [ 451.323367] ? current_time+0x72/0x1b0 [ 451.327278] __d_alloc+0xc8/0xd50 [ 451.330754] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 451.335785] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 451.340992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.346540] ? timespec64_trunc+0xea/0x180 [ 451.350785] ? inode_init_owner+0x340/0x340 [ 451.355122] ? _raw_spin_unlock+0x22/0x30 [ 451.359291] ? current_time+0x10b/0x1b0 [ 451.363279] ? __lockdep_init_map+0x105/0x590 [ 451.367803] d_alloc_pseudo+0x1d/0x30 [ 451.371617] alloc_file_pseudo+0x158/0x3f0 [ 451.375868] ? alloc_file+0x4d0/0x4d0 [ 451.379693] ? check_same_owner+0x340/0x340 [ 451.384030] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 451.389054] ? __check_object_size+0xa3/0x5d7 [ 451.393565] ? kasan_check_write+0x14/0x20 [ 451.397815] __shmem_file_setup.part.45+0x110/0x2a0 [ 451.402850] shmem_file_setup+0x65/0x90 [ 451.406844] __x64_sys_memfd_create+0x2af/0x4f0 [ 451.411534] ? memfd_fcntl+0x1580/0x1580 [ 451.415606] ? ksys_ioctl+0x81/0xd0 [ 451.419257] do_syscall_64+0x1b9/0x820 [ 451.423176] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 451.428555] ? syscall_return_slowpath+0x5e0/0x5e0 [ 451.433496] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 451.438521] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 451.443544] ? recalc_sigpending_tsk+0x180/0x180 [ 451.448313] ? kasan_check_write+0x14/0x20 [ 451.452576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.457441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.462630] RIP: 0033:0x457099 15:01:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 451.465836] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.484745] RSP: 002b:00007fbec30dfa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 451.492471] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000457099 [ 451.499746] RDX: 0000000020000558 RSI: 0000000000000000 RDI: 00000000004c25ce [ 451.507017] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 451.514325] R10: 0000000020000558 R11: 0000000000000246 R12: 0000000000001bc6 [ 451.521597] R13: 00000000004d76f8 R14: 00000000004c25ce R15: 0000000000000002 15:01:56 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000000)={0x3, 0x9, 0x8, 0x8ccb}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000001c0)={0x28, 0x2, 0x0, {0x5, 0xbd, 0x5}}, 0x28) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x4, 0x6f0, [0x200002c0, 0x0, 0x0, 0x200005c0, 0x200005f0], 0x0, &(0x7f0000000180), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x1, 0x0, 'ipddp0\x00', 'veth0\x00', 'syzkaller1\x00', 'rose0\x00', @random="334d298bd563", [0xff, 0xff, 0x0, 0xff, 0xff], @local, [0x0, 0xff], 0xb8, 0xf0, 0x128, [@limit={'limit\x00', 0x20, {{0x7, 0x171cd826, 0xffffffffffff4985, 0x5, 0xfffffffffffffe01, 0x200}}}]}, [@snat={'snat\x00', 0x10, {{@random="63dcd7a86c83", 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0x10}}}}, {{{0x0, 0x20, 0x655f, 'veth0_to_bridge\x00', 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'team_slave_1\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0xff, 0xff, 0xff], 0x108, 0x178, 0x1a8, [@cluster={'cluster\x00', 0x10, {{0x101, 0xffffffffffffff16, 0x5}}}, @arp={'arp\x00', 0x38, {{0x103, 0x0, 0x9, @local, 0xff000000, @loopback, 0xffffff00, @dev={[], 0x1b}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="8ee9ace01cb8", [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xe8}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xfffffffffffffffc}}}, @arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x11}, 0xffffffffffffffff}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x3, 0x40, 0x0, 'bond_slave_0\x00', 'syz_tun\x00', 'syzkaller1\x00', 'tunl0\x00', @dev={[], 0x1c}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @empty, [0x0, 0x0, 0x0, 0x0, 0xff], 0xb0, 0x218, 0x250, [@statistic={'statistic\x00', 0x18, {{0x0, 0x1, 0x2, 0x46b, 0x101, 0x3}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x100, 'system_u:object_r:userio_device_t:s0\x00'}}}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @snat={'snat\x00', 0x10, {{@dev={[], 0xb}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x3, 0x4, 0x99f7, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'nr0\x00', 'team0\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0xa8, 0xe0, 0x110, [@mac={'mac\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x6784e7aac855c8b4}}}}]}, [@snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x768) 15:01:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 451.587199] hfs: can't find a HFS filesystem on dev loop3 15:01:57 executing program 7 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xe8ff0000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7, &(0x7f0000000240)) 15:01:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 451.796178] FAULT_INJECTION: forcing a failure. [ 451.796178] name failslab, interval 1, probability 0, space 0, times 0 [ 451.807507] CPU: 0 PID: 26812 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 451.816001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.825357] Call Trace: [ 451.827974] dump_stack+0x1c9/0x2b4 [ 451.831620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 451.836846] should_fail.cold.4+0xa/0x11 [ 451.840937] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 451.846072] ? save_stack+0x43/0xd0 [ 451.849719] ? kasan_kmalloc+0xc4/0xe0 [ 451.853624] ? kasan_slab_alloc+0x12/0x20 [ 451.857799] ? kmem_cache_alloc+0x12e/0x710 [ 451.862133] ? __d_alloc+0xc8/0xd50 [ 451.865795] ? lock_downgrade+0x8f0/0x8f0 [ 451.869960] ? graph_lock+0x170/0x170 [ 451.873789] ? find_held_lock+0x36/0x1c0 [ 451.877892] ? check_same_owner+0x340/0x340 [ 451.882234] ? lock_downgrade+0x8f0/0x8f0 [ 451.886434] ? rcu_note_context_switch+0x680/0x680 [ 451.891419] __should_failslab+0x124/0x180 [ 451.895703] should_failslab+0x9/0x14 [ 451.899527] kmem_cache_alloc+0x29c/0x710 [ 451.903722] ? kasan_check_write+0x14/0x20 [ 451.907980] __alloc_file+0xac/0x400 [ 451.911709] ? file_free_rcu+0x90/0x90 [ 451.915612] ? lock_downgrade+0x8f0/0x8f0 [ 451.919779] ? kasan_check_read+0x11/0x20 [ 451.923939] ? do_raw_spin_unlock+0xa7/0x2f0 [ 451.928360] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 451.932966] alloc_empty_file+0x72/0x170 [ 451.937051] alloc_file+0x5e/0x4d0 [ 451.940610] alloc_file_pseudo+0x261/0x3f0 [ 451.944861] ? alloc_file+0x4d0/0x4d0 [ 451.948687] ? check_same_owner+0x340/0x340 [ 451.953249] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 451.958273] ? __check_object_size+0xa3/0x5d7 [ 451.962782] ? kasan_check_write+0x14/0x20 [ 451.967035] __shmem_file_setup.part.45+0x110/0x2a0 [ 451.972078] shmem_file_setup+0x65/0x90 [ 451.976076] __x64_sys_memfd_create+0x2af/0x4f0 [ 451.980782] ? memfd_fcntl+0x1580/0x1580 [ 451.984851] ? ksys_ioctl+0x81/0xd0 [ 451.988502] do_syscall_64+0x1b9/0x820 [ 451.992403] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 451.997790] ? syscall_return_slowpath+0x5e0/0x5e0 [ 452.002732] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 452.007758] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 452.012778] ? recalc_sigpending_tsk+0x180/0x180 [ 452.018683] ? kasan_check_write+0x14/0x20 [ 452.022936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.027807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.033037] RIP: 0033:0x457099 [ 452.036246] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 452.055147] RSP: 002b:00007fbec30dfa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 452.062866] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000457099 [ 452.070142] RDX: 0000000020000558 RSI: 0000000000000000 RDI: 00000000004c25ce [ 452.077424] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 452.084693] R10: 0000000020000558 R11: 0000000000000246 R12: 0000000000001bc6 15:01:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000140)=0x40, 0x4) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000100)={0x3, 0x0, [{0x481, 0x0, 0xc5d3}, {0x247, 0x0, 0x8}, {0xa3f, 0x0, 0x1}]}) [ 452.091963] R13: 00000000004d76f8 R14: 00000000004c25ce R15: 0000000000000003 15:01:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:57 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x1000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4, &(0x7f0000000240)) 15:01:57 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr}], 0x30) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') mq_getsetattr(r0, &(0x7f0000000040)={0x7f, 0x1, 0x8, 0x80, 0x5, 0x0, 0xb9, 0x6}, &(0x7f0000000140)) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x8040) 15:01:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x300}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000110000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:57 executing program 7 (fault-call:2 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4c000000, &(0x7f0000000240)) 15:01:57 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@rand_addr, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) io_setup(0x4, &(0x7f0000000240)=0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000006c0)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000740)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x100, 0x0) io_submit(r2, 0x4, &(0x7f0000000680)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x5, r0, &(0x7f00000003c0)="ff84ad714188cc919d7d2d2bf9", 0xd, 0x5, 0x0, 0x1, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xf, 0x3, r0, &(0x7f0000000440)="ed65cf67babbc52d88bd6bb8c0cdacfba215303c289f5c26888c", 0x1a, 0x1, 0x0, 0x3, r4}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x8, 0x9d5c, r0, &(0x7f0000000500)="d7ba6685a3541294fe8ecf3475db3f58527ad4d0037e296820fd092dbe17778aca7939a8be604df440db92b62e55e41300a90361fbd959139025d3f9af60972df675dc2b07fa5f286166f242a40c621ed5b26c005502acfb5153df0bd80147a4ccd8391e64d3b4a2070f9ee881b90c5199270b08980e9b59f06288dfa10c40cec9db0ddb", 0x84, 0x2, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0xb, 0x4, r0, &(0x7f0000000600)="9bd92e5d09464cdd0404b0f435683bd38e84ae11debde670ee2a947bc688d2c6ff7ca6a319d9b3", 0x27, 0x36, 0x0, 0x1}]) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000001c0)={0x9, 0x7fffffff}) chown(&(0x7f0000000000)='./file0\x00', r1, r5) 15:01:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x278}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:01:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 452.690544] FAULT_INJECTION: forcing a failure. [ 452.690544] name failslab, interval 1, probability 0, space 0, times 0 [ 452.701948] CPU: 0 PID: 26892 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 452.710459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.719819] Call Trace: [ 452.722446] dump_stack+0x1c9/0x2b4 [ 452.726108] ? dump_stack_print_info.cold.2+0x52/0x52 [ 452.731343] ? lock_downgrade+0x8f0/0x8f0 [ 452.735520] ? perf_trace_lock+0xde/0x920 [ 452.739714] should_fail.cold.4+0xa/0x11 [ 452.743801] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 452.748933] ? is_bpf_text_address+0xd7/0x170 [ 452.753449] ? kernel_text_address+0x79/0xf0 [ 452.757874] ? __kernel_text_address+0xd/0x40 [ 452.762410] ? unwind_get_return_address+0x61/0xa0 [ 452.767370] ? __save_stack_trace+0x8d/0xf0 [ 452.771725] ? find_held_lock+0x36/0x1c0 [ 452.775837] ? check_same_owner+0x340/0x340 [ 452.780203] ? rcu_note_context_switch+0x680/0x680 [ 452.785157] ? lock_downgrade+0x8f0/0x8f0 [ 452.789337] __should_failslab+0x124/0x180 [ 452.793598] should_failslab+0x9/0x14 [ 452.797427] kmem_cache_alloc_trace+0x2b5/0x730 [ 452.802115] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 452.806819] apparmor_file_alloc_security+0x162/0xa90 [ 452.812025] ? trace_hardirqs_on+0xbd/0x2c0 [ 452.816381] ? rcu_pm_notify+0xc0/0xc0 [ 452.820321] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 452.826155] ? rcu_read_lock_sched_held+0x108/0x120 [ 452.831196] ? kmem_cache_alloc+0x30b/0x710 [ 452.835539] ? kasan_check_write+0x14/0x20 15:01:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x244a00) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000140)={0x0, 0x9, 0x7, &(0x7f0000000100)=0x100}) 15:01:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x200000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 452.839804] security_file_alloc+0x4c/0xa0 [ 452.844062] __alloc_file+0xfc/0x400 [ 452.847798] ? file_free_rcu+0x90/0x90 [ 452.851733] ? lock_downgrade+0x8f0/0x8f0 [ 452.855906] ? kasan_check_read+0x11/0x20 [ 452.860067] ? do_raw_spin_unlock+0xa7/0x2f0 [ 452.864498] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 452.869115] alloc_empty_file+0x72/0x170 [ 452.873264] alloc_file+0x5e/0x4d0 [ 452.876846] alloc_file_pseudo+0x261/0x3f0 [ 452.881110] ? alloc_file+0x4d0/0x4d0 [ 452.884942] ? check_same_owner+0x340/0x340 [ 452.889307] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 452.894339] ? __check_object_size+0xa3/0x5d7 [ 452.898840] ? kasan_check_write+0x14/0x20 [ 452.903099] __shmem_file_setup.part.45+0x110/0x2a0 [ 452.908145] shmem_file_setup+0x65/0x90 [ 452.912122] __x64_sys_memfd_create+0x2af/0x4f0 [ 452.916809] ? memfd_fcntl+0x1580/0x1580 [ 452.920885] ? ksys_ioctl+0x81/0xd0 [ 452.924537] do_syscall_64+0x1b9/0x820 [ 452.928442] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 452.933809] ? syscall_return_slowpath+0x5e0/0x5e0 [ 452.938730] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 452.943751] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 452.948767] ? recalc_sigpending_tsk+0x180/0x180 [ 452.953563] ? kasan_check_write+0x14/0x20 [ 452.957840] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.962711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.967908] RIP: 0033:0x457099 [ 452.971097] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:01:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000074000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 452.990009] RSP: 002b:00007fbec30dfa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 452.997725] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000457099 [ 453.004981] RDX: 0000000020000558 RSI: 0000000000000000 RDI: 00000000004c25ce [ 453.012241] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 453.019506] R10: 0000000020000558 R11: 0000000000000246 R12: 0000000000001bc6 [ 453.026783] R13: 00000000004d76f8 R14: 00000000004c25ce R15: 0000000000000004 15:01:58 executing program 7 (fault-call:2 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 453.098012] hfs: can't find a HFS filesystem on dev loop3 15:01:58 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6f3, 0x80401) accept4(r0, &(0x7f0000000140)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x80, 0x80000) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:01:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x10, &(0x7f0000000240)) 15:01:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000009e9000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 453.291027] FAULT_INJECTION: forcing a failure. [ 453.291027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 453.303171] CPU: 0 PID: 26934 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 453.311677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.321038] Call Trace: [ 453.323645] dump_stack+0x1c9/0x2b4 [ 453.327299] ? dump_stack_print_info.cold.2+0x52/0x52 [ 453.332522] should_fail.cold.4+0xa/0x11 [ 453.336596] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 453.341690] ? graph_lock+0x170/0x170 [ 453.345478] ? find_held_lock+0x36/0x1c0 [ 453.349525] ? graph_lock+0x170/0x170 [ 453.353414] ? find_held_lock+0x36/0x1c0 [ 453.357464] ? __lock_is_held+0xb5/0x140 [ 453.361520] ? check_same_owner+0x340/0x340 [ 453.365829] ? find_get_entry+0x2e4/0xc90 [ 453.369984] ? rcu_note_context_switch+0x680/0x680 [ 453.374922] __alloc_pages_nodemask+0x365/0xd10 [ 453.379583] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 453.384586] ? update_load_avg+0x389/0x27d0 [ 453.388909] ? attach_entity_load_avg+0x860/0x860 [ 453.393744] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 453.398773] ? percpu_counter_add_batch+0xf2/0x150 [ 453.403693] ? mpol_shared_policy_lookup+0xf7/0x150 [ 453.408704] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 453.414258] alloc_pages_vma+0xdd/0x540 [ 453.418227] shmem_alloc_page+0xa8/0x190 [ 453.422275] ? shmem_swapin+0x230/0x230 [ 453.426248] shmem_alloc_and_acct_page+0x1f1/0x820 [ 453.431185] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 453.435840] ? __lock_acquire+0x7fc/0x5020 [ 453.440076] ? graph_lock+0x170/0x170 [ 453.443881] shmem_getpage_gfp+0x6ea/0x41e0 [ 453.448209] ? shmem_writepage+0x1380/0x1380 [ 453.452608] ? __lock_acquire+0x7fc/0x5020 [ 453.456830] ? print_usage_bug+0xc0/0xc0 [ 453.460892] ? print_usage_bug+0xc0/0xc0 [ 453.464944] ? print_usage_bug+0xc0/0xc0 [ 453.468992] ? print_usage_bug+0xc0/0xc0 [ 453.473041] ? print_usage_bug+0xc0/0xc0 [ 453.477086] ? check_noncircular+0x20/0x20 [ 453.481325] ? __lock_acquire+0x7fc/0x5020 [ 453.485545] ? __lock_acquire+0x7fc/0x5020 [ 453.489771] ? mark_held_locks+0x160/0x160 [ 453.493990] ? print_usage_bug+0xc0/0xc0 [ 453.498036] ? lock_downgrade+0x8f0/0x8f0 [ 453.502171] ? print_usage_bug+0xc0/0xc0 [ 453.506217] ? kasan_check_read+0x11/0x20 [ 453.510353] ? rcu_is_watching+0x8c/0x150 [ 453.514488] ? __lock_acquire+0x7fc/0x5020 [ 453.518711] ? __lock_acquire+0x7fc/0x5020 [ 453.522931] ? is_bpf_text_address+0xd7/0x170 [ 453.527421] ? __lock_acquire+0x7fc/0x5020 [ 453.531641] ? mark_held_locks+0x160/0x160 [ 453.535872] ? __lock_acquire+0x7fc/0x5020 [ 453.540103] ? graph_lock+0x170/0x170 [ 453.543900] ? print_usage_bug+0xc0/0xc0 [ 453.547952] ? find_held_lock+0x36/0x1c0 [ 453.551999] ? find_held_lock+0x36/0x1c0 [ 453.556050] ? mark_held_locks+0xc9/0x160 [ 453.560208] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 453.565387] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 453.570597] ? lockdep_hardirqs_on+0x421/0x5c0 [ 453.575166] ? trace_hardirqs_on+0xbd/0x2c0 [ 453.579490] ? kasan_check_write+0x14/0x20 [ 453.583711] ? current_time+0x72/0x1b0 [ 453.587584] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 453.592699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 453.598250] ? iov_iter_fault_in_readable+0x23d/0x460 [ 453.603455] ? copy_page_from_iter+0x890/0x890 [ 453.608046] ? __sanitizer_cov_trace_const_cmp8+0x3/0x20 [ 453.613506] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 453.618710] shmem_write_begin+0x110/0x1e0 [ 453.622966] generic_perform_write+0x3ae/0x6c0 [ 453.627616] ? add_page_wait_queue+0x2c0/0x2c0 [ 453.632234] ? file_update_time+0xe4/0x640 [ 453.636477] ? current_time+0x1b0/0x1b0 [ 453.640470] ? down_write+0x8f/0x130 [ 453.644195] __generic_file_write_iter+0x26e/0x630 [ 453.649140] generic_file_write_iter+0x438/0x870 [ 453.653914] ? __generic_file_write_iter+0x630/0x630 [ 453.659034] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 453.664576] ? iov_iter_init+0xc9/0x1f0 [ 453.668566] __vfs_write+0x6af/0x9d0 [ 453.672293] ? kernel_read+0x120/0x120 [ 453.676195] ? __lock_is_held+0xb5/0x140 [ 453.680281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.685824] ? __sb_start_write+0x17f/0x300 [ 453.690247] vfs_write+0x1fc/0x560 [ 453.693812] ksys_pwrite64+0x181/0x1b0 [ 453.697722] ? __ia32_sys_pread64+0xf0/0xf0 [ 453.702063] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 453.707612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.712982] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 453.718089] ? do_sys_ftruncate+0x44e/0x560 [ 453.722432] __x64_sys_pwrite64+0x97/0xf0 [ 453.726601] do_syscall_64+0x1b9/0x820 [ 453.730496] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 453.735867] ? syscall_return_slowpath+0x5e0/0x5e0 [ 453.740807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.745661] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 453.750692] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 453.755720] ? prepare_exit_to_usermode+0x291/0x3b0 [ 453.760752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.765622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.770832] RIP: 0033:0x410e37 [ 453.774031] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 15:01:59 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80000000002, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)={0x3}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x1ff, @ipv4={[], [], @multicast1}, 0x8001}, r1}}, 0x30) 15:01:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf0ffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 453.792935] RSP: 002b:00007fbec30dfa10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 453.800650] RAX: ffffffffffffffda RBX: 0000000020000550 RCX: 0000000000410e37 [ 453.807929] RDX: 000000000000001d RSI: 0000000020000180 RDI: 0000000000000005 [ 453.815217] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 453.822487] R10: 0000000000000de3 R11: 0000000000000293 R12: 00007fbec30e06d4 [ 453.829757] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000000000000 15:01:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e0d7c3a5ade096ea511e3f49f71ce569b06000000405d00e6ff0000000101f1b9592f0800000000000000007a9854665c26f0d1c0f729eb6baf4ccbc109fb04f52987d9ef01493f82e54ea4099123fe8da49c7e14e07ededd10265ca68a8a63d4739cc5d17fe15418a9f115cb07568e78536412e8db93b908d2c39a64abfb2033280c40bca4dee75e35ab9cd467c2e1f3762216d11b986c2858918428ecd3207b45f767c332ce96b676afb7fed8ee5221d071e1a894c11ef51d0035839b0eeb8c5f86a0b3bf9762df3d39b9d2eba8e416edbcafce00c0acbc0c5406bc8a97d4f6707b253d41161928bf", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 454.003053] Dev loop7: unable to read RDB block 13 [ 454.008239] loop7: unable to read partition table 15:01:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x48000000, &(0x7f0000000240)) 15:01:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x2a0000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 454.145726] loop7: partition table beyond EOD, truncated [ 454.151379] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 15:01:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', './cgroup.cpu\x00'}, &(0x7f0000000300)=""/236, 0xec) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x2d, "6370758c00b1a1758e5f88062aab049a709d6217ee31fd1a74e0e4cc5600d3f9d47f4db8e97294ea28cc771947f573267fc2bc7e0ec324becde98718b4784a568c549e59c2aa9a4d53b7ec801236"}]}, 0x93d2e335d2230a02) 15:01:59 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x3c) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x6, 0x10}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x7fffffff, 0xc56e, 0x207, 0x9, 0x6, 0x8000, 0x1, 0x401, r1}, 0x20) 15:01:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 454.293216] hfs: can't find a HFS filesystem on dev loop3 15:01:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:01:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xfffff000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:01:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:01:59 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x204000, 0x10) ioctl$BLKRRPART(r0, 0x125f, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x10107a, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080)=0x100000001, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x8}, 0x18) 15:01:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x80, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40100600}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r1, 0x320, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3c, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0xd}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) 15:01:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00030000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673c0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:01:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6800, &(0x7f0000000240)) 15:02:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7a, &(0x7f0000000240)) [ 454.698819] hfs: can't find a HFS filesystem on dev loop3 15:02:00 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000240)={0xd83f, 0xf2, 0x6, 0x0, 0x0, [{r0, 0x0, 0x100}, {r0, 0x0, 0x8}, {r0, 0x0, 0x100}, {r0, 0x0, 0x9}, {r0, 0x0, 0x7e}, {r0, 0x0, 0x5}]}) 15:02:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xe8ff00}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00060000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x3, 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000140)) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000080)) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000200)) 15:02:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x9e9, &(0x7f0000000240)) [ 455.050787] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 455.307507] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0xfffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x74000000, &(0x7f0000000240)) 15:02:00 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vcan0\x00', r1}) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') setsockopt(r0, 0x3ff, 0xffffffffffff8001, &(0x7f0000000000)="fb95f64771e66128a667e3d1bb31588245866d228eae5d9e66f340e03bd2ed956c19db5c092cea7b944adbe519bf6fce0bfaaedad17cfe41dca012961dc820544bd419f4b681", 0x46) 15:02:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afbffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x2}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3, 0x6e02) accept$unix(r5, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0xc0010000, 0x0, 0x40000106]}) r6 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r7 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setresgid(r7, r8, r9) write$cgroup_subtree(r6, &(0x7f0000000080), 0x0) 15:02:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:00 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 455.479363] hfs: can't find a HFS filesystem on dev loop3 15:02:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x100100, &(0x7f0000000240)) [ 455.584706] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x8000000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a08000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 455.616836] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 455.736615] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:01 executing program 6: truncate(&(0x7f0000000000)='./file0\x00', 0x6) r0 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80000) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000001300)={"73797a05006c6c00", {0x2, 0x4e20, @rand_addr=0x1}}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x100000000100, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x1015, 0x4, 0x66, "95be408875bbf22402555b0d7526c423", "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"}, 0x1015, 0x1) symlinkat(&(0x7f00000001c0)='./file1\x00', r1, &(0x7f0000000240)='./file0\x00') [ 455.768591] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000200)) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x6, 0x80) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000100)) [ 455.849632] hfs: can't find a HFS filesystem on dev loop3 15:02:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x4000000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3000000, &(0x7f0000000240)) 15:02:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x400000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffe00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfcfdffff, &(0x7f0000000240)) 15:02:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:01 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffff9c, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000140)=0xc) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x10, 0x4) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002600)=0x0) fstat(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002900)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000002a00)=0xe8) fstat(r0, &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003e40)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003f40)=0xe8) stat(&(0x7f0000003f80)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getpgid(0x0) getresuid(&(0x7f0000005480)=0x0, &(0x7f00000054c0), &(0x7f0000005500)) getresgid(&(0x7f0000005540), &(0x7f0000005580), &(0x7f00000055c0)=0x0) r13 = gettid() r14 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005600)={0x0, 0x0, 0x0}, &(0x7f0000005640)=0xc) [ 456.144834] loop7: [CUMANA/ADFS] p1 [ADFS] p1 sendmmsg$unix(r0, &(0x7f00000057c0)=[{&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000240)="ee9e01d5011965fe76", 0x9}, {&(0x7f00000002c0)="68591fecc71cf14abb1da46fad0333acc7dbabf0c124c369126354b218d50c11abe4f14fc032dcacb85f267e9b32950de41c08a97bcac0aa11b64ac41b8fec8960f37c38a00d739e68e727ee421544010e006427ef58e4d8f8c194c1885ddc1fd9697ad9536ae3ac15383d0a70f98d0758e755f1faf2608e525751a7366a437eed98eca89a09355b8ee0747d7f06", 0x8e}, {&(0x7f0000000380)="0e7a9dcfd31005e68768fcafffbce579faef70", 0x13}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="4012c3963db5c690d1", 0x9}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="59913371ec70e988fbdf2f6761147483f7c822e5082fdbd3d0b42428b64549a5d95efb144da96d059c30035e5abe53cdab6315968e8bc76c36a0c58de9c9bb1858100cef2ceeecb4c7e48f3e991618020de68bbc13557d563bb1aa94171350585c3956206fe6e696c6249ce84995b8d8d2", 0x71}, {&(0x7f0000002480)="df4b6f8013e2d6d306471e71c32be79a67552d734862e2c411ebac0bd15132af76b7ba3c8663c77ca8dd25bd1acab421db04fb00334e63ab8b13343f7a9b5ae64b66ce5d25d6ffce325f7bb9412f3af6a7fced1fc70ace53c9f2da12a9b79fd2056496a11aa6c3bcdd310dbd2976586ccaef12cafa2e6d8161e75dc761f72d6b90325a7be1ea156fdc10c62db548e6c56a3226176b1b324c9fd7129e1f2ad4ae581a80f55fc32f50558979a89847ff94acbb04ff356e365847913710979db9e5f9b32a7efd0f6936deaba82c0351d97bff746aa421ed53e3190f5f31deafcecc6242ecbcbbf910b6d87ec0", 0xeb}], 0x8, &(0x7f0000002780)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x40, 0xc0}, {&(0x7f00000027c0)=@abs={0x1, 0x0, 0x5}, 0x6e, &(0x7f00000028c0)=[{&(0x7f0000002840)="bbf54e87c83baad0825ab9b58e23a4f31572d5c0dbae0cbed3a9fdcaf682a4b794938af22c19400b7fb9d7d5802413668569cb79a115aed95822e6643b6e1aae9648", 0x42}], 0x1, &(0x7f0000002ac0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x20, 0x891}, {&(0x7f0000002b00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000002b80)="a0f49811e1031103b9a6b05360bfdcc247535fa19b7e6378aca10b0b25e12a74489c7d756775105eefe48ea48032318109382d1ec57ce705", 0x38}, {&(0x7f0000002bc0)="cedf80b8c31221ba3c4bcae89beb6172ca4d02b737db53c8fe0bd4ba3d3eaf5155c038db2e55db29c3a685820be5aec269e1611d21c43b28a251663c949440d3c5ae", 0x42}, {&(0x7f0000002c40)="ff9540b5a14dc5b90d5a6716cbec181d87a23a01bf113000325c53be20dbb6f30baf928bdaab39fa5cc3f8a277ac7c3484e261ef2615a76cc9ff20872af07d03bc1b8b6994f8", 0x46}, {&(0x7f0000002cc0)="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", 0x1000}, {&(0x7f0000003cc0)="795a897eebebee61c41dd4a4acc2326a1a1a182c27d3811a821bff2f788e20cf812819e65ff259ee2dcc901f0b71f7717002e66e9aee6d8975b973a227e04e2ad871eb2eb5ef7525786cfabfd8922e146c9b86ed4294c9fbaa479c8a7be308de68420563cd4f0ae9ed5e0c5c0fa72aaba6491a9d7fdbb4551fe63e6b32617bbe622f4f3fb532dc4ba346e86dc7d2da7aa7733e003e4462de1b9137b606ddc262c0c906b823432995ab0f94aa985521834df5192c105e0f957da45e1589a27a85e028652fdbd7b38d465a2993cc251c34374c18f0a9457972051ce16dc0e212f50d811da7", 0xe4}], 0x5, &(0x7f0000004040)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}], 0x20, 0x4000010}, {&(0x7f0000004080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005400)=[{&(0x7f0000004100)="820804481bd91d402a", 0x9}, {&(0x7f0000004140)="20e10b5d8cb125b7022e6b63137e39ead8236a5fb7ff274f06b80628a3760daf9b3efc2d614c06dfa5180291fcfca361ce3f1adbf2b0a1bb84906dee03d62e2a02356a2be68dae91513725cba5a5d2aa8db47f4883f3bf73c6a762065578abef5a304d5df843b52cf677799c0553a6663458aa76132b3c8a", 0x78}, {&(0x7f00000041c0)="93a374781c7c574e039c4cc93753048a31af7b94797e3f09425857de0ab3438fc40f484ba9e3b5893c1daadd49e41ca3b1c637515dd5ab2c9ed9cb1c0ae0fea873e576b4064af2377f55c6479275328627e757e32a83443029155f1cf7486ba6e4c4e5d350f7558806c0694a79c3d0d99b7c10bac391b4d442c3719c7a48ff86e486430d9ebcf678957a201cdf7c586815be10a7a4e98ae914ce0fd9d73ecf8de7549b455224634c02fc64b93b18fe796a3ddbdbed8844c1fc3746c661692303ee7f5ec0", 0xc4}, {&(0x7f00000042c0)="ebdc0d5ccabbd4b0b7416f1d59492a31adf84bb50fd7ab3897182494d39f3aacc0f040f463c15935415174dfed6562fc582eac221b2617242c68112acc1260f4313ca42797d7104ea0585d9f1ebfb806d3310c7bb50b3cb6d1d93b9868f285da4eb06c03fd282550c26a79646832e84ee8ebb7", 0x73}, {&(0x7f0000004340)="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", 0x1000}, {&(0x7f0000005340)="8c3ade7cd3a64783805da2a8dfbb2da67ac5b9ee85cf33b85fcc3f4307a0cd97e4b6e2ee518c89907cea576e5d845637f625f0a958a327e01fbdb63ec1aff1c92481", 0x42}, {&(0x7f00000053c0)}], 0x7, &(0x7f0000005680)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}], 0x110, 0x800}], 0x4, 0x4001) [ 456.186543] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:01 executing program 5: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = mq_open(&(0x7f0000000100)='\x00', 0x40, 0x5, &(0x7f0000000140)={0x1187, 0x3, 0x8, 0x40, 0x1, 0x1, 0x5, 0x2}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x387000, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x480000, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x2000, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)={0x800000000000, 0x1, 0x4, 0x0, 0x0, [{r1, 0x0, 0x2ff55fb7}, {r2, 0x0, 0x101}, {r3, 0x0, 0x141}, {r4, 0x0, 0x1}]}) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000080)=0x4, 0x4) write$cgroup_subtree(r7, &(0x7f0000000080)=ANY=[], 0x0) 15:02:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x2a00}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000080000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x7a000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 456.348782] hfs: can't find a HFS filesystem on dev loop3 15:02:01 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x101083, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) r1 = geteuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r1) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000000)='./file0/file0\x00') 15:02:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x600, &(0x7f0000000240)) [ 456.528020] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:01 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000200)={{0x7, 0x1, 0x27, 0x6, 'syz1\x00', 0x101}, 0x6, 0x2, 0x2, r2, 0x0, 0x8, 'syz0\x00', &(0x7f0000000100), 0x0, [], [0x40, 0x1000, 0x4, 0x1f]}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080), 0x0) 15:02:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x4}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 456.585428] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a006c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 456.695343] hfs: can't find a HFS filesystem on dev loop3 15:02:02 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e21, 0x0, @loopback, 0x2}}, 0x5a6d, 0x4, 0x2, 0x100000000, 0x8001}, &(0x7f0000000240)=0x98) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') socket$alg(0x26, 0x5, 0x0) 15:02:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x730e0100, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6c00, &(0x7f0000000240)) 15:02:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)="6370751f00742e73636865645f72656c61785f646f6d61696e5f6c6576656c00", 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x0) 15:02:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00200000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x14}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 456.995977] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:02 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') socket$inet_dccp(0x2, 0x6, 0x0) [ 457.054470] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1f00, &(0x7f0000000240)) 15:02:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000100)={0xfffffffffffffaf8, 0x8, 0x9, 0x7, 0x2, 0x7, 0xb13a}) [ 457.200531] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x9effffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000800000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 457.280615] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:02 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') epoll_wait(r0, &(0x7f0000000000)=[{}, {}, {}], 0x3, 0xfffffffffffffffb) 15:02:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xfffffff6}) 15:02:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x40000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) readv(r0, &(0x7f0000001400)=[{&(0x7f0000000080)=""/18, 0x12}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/202, 0xca}, {&(0x7f0000001300)=""/158, 0x9e}, {&(0x7f0000000100)=""/126, 0x7e}, {&(0x7f00000013c0)=""/55, 0x37}], 0x6) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:02:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x60060000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:03 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x26, 0x5}, &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r1, 0x2}, &(0x7f0000000400)=0x8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000040)={0x7, 0x1, 0x6}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000001c0)={0x0, 0x5}) fcntl$notify(r2, 0x402, 0x18) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)="05c800f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') connect$nfc_llcp(r2, &(0x7f0000000500)={0x27, 0x1, 0x0, 0x4, 0x8, 0x10000, "9ac697e5364895d1f1ed5947ff1223b6cd7e39b00af4e3f4e78f332d197c2e3fe13c00f2d7810069c097b151b101e95d368938a032c794579d138c465663b0", 0x28}, 0x60) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000002c0)="b7a5579747104da9fc01dd171e979717c7e21f357f4503263b3e9f05c07507b8d677e90be02333b2b9e740f71a14fb4defde07b18eabe6c37742319649b1d959c02373e634e1a8c8dfb7d318d0", 0x4d) sched_rr_get_interval(r3, &(0x7f0000000180)) 15:02:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 457.759240] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x48}) 15:02:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000080), &(0x7f0000000100)=0x40) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000140)=0x1c, 0x4) [ 457.822381] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf00}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 457.882540] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:03 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000040), 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 457.921069] hfs: can't find a HFS filesystem on dev loop3 [ 457.953098] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x97ffffff}) 15:02:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x10e64, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000003f, &(0x7f0000000100)=0x100000000, 0x4) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 15:02:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xfffffff0}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:03 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') signalfd(r0, &(0x7f0000000040)={0x1}, 0x8) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 458.308412] hfs: can't find a HFS filesystem on dev loop3 [ 458.350730] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 458.366967] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xf6ffffff}) 15:02:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x204841) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r2, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x800, {0x2, 0x3, 0x1}, 0x0, r3, r4, 0x4, 0x0, 0x5, 0x8, 0x2, 0x100000001, 0x1, 0x1, 0x3, 0x0, 0x2, 0x10001, 0x8, 0xb20, 0x366f}}, 0xa0) [ 458.521592] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xffe800}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673fc", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 458.545144] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:04 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x2) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x10e6f, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x101000, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000002c0)={0x0, 0x0, 0x2080}) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x2bc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r2, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xe}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 15:02:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xfffffffd}) 15:02:04 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="6479b4309e0367198fb54fd25d551eeffb080557924c904e1b7225c8034b304210d785ce4aa2a87d8c5d7caf0f2161", 0x2f}], 0x1) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x3}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 458.931244] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 458.970326] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a004c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:04 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x14000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r1, 0x7f, 0x0, 0x0, 0x6, 0x200}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) 15:02:04 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000240)=""/227, &(0x7f0000000040)=0xe3) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 459.103567] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xffffff7f}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 459.131948] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x6c}) 15:02:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x10e68, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x5e0, 0x140, 0x0, 0x358, 0x140, 0x140, 0x548, 0x548, 0x548, 0x548, 0x548, 0x5, &(0x7f0000000100), {[{{@uncond, 0x0, 0x108, 0x140, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x20, 0x2, 0x1, 0x1}}, @common=@set={0x40, 'set\x00', 0x0, {{0x6, [0x6, 0x1, 0x368d, 0x10001, 0x9, 0x8e7e], 0xe0, 0x60, 0xffffffff}}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @loopback, @multicast2, @port=0x4e20, @icmp_id=0x65}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @empty, @dev={0xac, 0x14, 0x14, 0x1d}, @gre_key=0xe9a, @gre_key=0x2}}}}, {{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x210, 0x10, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @link_local, 0x0, 0xd, [0x2, 0x8, 0x39, 0x8, 0x35, 0x10, 0x35, 0x2a, 0x24, 0xe, 0x27, 0x2d, 0x28, 0x18, 0xd, 0x3], 0x0, 0x0, 0xf9}}}, {{@uncond, 0x0, 0x1b8, 0x1f0, 0x0, {}, [@common=@unspec=@comment={0x120, 'comment\x00'}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x15, @local, @rand_addr=0x556, @icmp_id=0x65, @gre_key=0x4}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x640) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 15:02:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00ffffff970000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:04 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000000)="0b0900f5000319", 0xffffffffffffff0e}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x99b) [ 459.408858] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xf0ffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4000000000000000}) [ 459.491566] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:05 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) 15:02:05 executing program 6: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x109000, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000002c0)=""/245, &(0x7f0000000040)=0xf5) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 459.645608] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00c0ed00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="6866739a", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x2000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 459.726419] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x6b0e010000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:02:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x20100000}) 15:02:05 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8100081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x3d, &(0x7f00000002c0)=""/4096, &(0x7f0000000040)=0x1000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000012c0)={r1, @in6={{0xa, 0x4e22, 0x1ff, @loopback, 0x400}}, 0x800081, 0x90000000}, 0x90) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 459.926807] print_req_error: I/O error, dev loop0, sector 128 15:02:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x660}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 460.071117] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 460.122269] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:05 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)="8270757365742e6d650b81d3ee2f6d7300", 0x2, 0x0) pipe2$9p(&(0x7f0000000040), 0x84000) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRES32=r0, @ANYRESDEC=r1], 0x2a) 15:02:05 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101082, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x40000000}) [ 460.267281] hfs: can't find a HFS filesystem on dev loop3 15:02:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0xfffffff6, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000fff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x1400000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673e9", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x11, 0x4000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x300000f, 0x4010, r2, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e24, 0x80, @loopback, 0x4}}, 0x61c, 0x200}, 0x90) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000002c0)={0x0, 0x3, 0xb15e, 0x9}) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:02:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:05 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xee01]) getgroups(0x4, &(0x7f0000000040)=[0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, r2, r3) [ 460.560000] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4c000000}) [ 460.649412] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x2a0000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 460.778780] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:06 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 460.824091] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x3f000000}) 15:02:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x101080, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xd4, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x1, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x0, 0x38, &(0x7f0000000100), &(0x7f0000000140)=[0x0, 0x0, 0x20, 0x0, 0x78, 0x38, 0x30]}}, @increfs={0x40046304, 0x1}, @release={0x40046306, 0x1}, @release={0x40046306, 0x2}, @increfs_done={0x40106308, r3, 0x4}, @request_death={0x400c630e, 0x3, 0x2}, @register_looper, @reply_sg={0x40486312, {{0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, &(0x7f0000000240), &(0x7f0000000280)=[0xb753e8eb56a568f, 0x28, 0x0]}, 0x1}}, @enter_looper], 0x24, 0x0, &(0x7f0000000400)="bfb390ef0e08223849f4d078e4d22999122b1ce8e6a166bf882994fbb1655e9fe939e06b"}) 15:02:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x5e0e010000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x100000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0009e900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x2000}) 15:02:06 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getrandom(&(0x7f00000002c0)=""/232, 0xe8, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x7f, "ad0bcae1d192b978aa05326caf2dfafea66ecededb5771931a6af7d948f8cf309ed40bd416a6ae924f579920d09c6e5cdb2aaf03e2bc0221477f0b4e6ffa30e294bde98243f503f323e86552bbdcbfa16fdd6344961e3702d59f11d7c7f0ebecf8d58bd34c94ad5088d72718e4d3cca7626bf85a7fbf28b036f922dd9d68bf"}, &(0x7f0000000000)=0xa3) [ 461.221839] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:06 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES16=r1, @ANYRES64=r1, @ANYPTR, @ANYRESOCT=r1, @ANYPTR], @ANYRES16=r1, @ANYRES64=r0]], 0x8) [ 461.274844] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0xffffffffffffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00100000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 461.458095] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:06 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x1e) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x101, 0x4) connect$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x300000000000000}) [ 461.488292] hfs: can't find a HFS filesystem on dev loop3 [ 461.511298] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x0, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xf2, @local, 0x4000000}, {0xa, 0x4e22, 0xce, @local, 0x3}, r1, 0x200}}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x0) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="67c6174a546bf902784bcd8d11cbcac2a4d6152eeae25cfd7531b7dbb5f9a08609b69955b4f934ef0c7c31afdb4f9159d1ca0e78e877a039de4d6e70bd71a42c0f89ed441758105f1342", 0x4a, r4) 15:02:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x7802}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x23000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000003f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:07 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x84080, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4800000000000000}) 15:02:07 executing program 5: perf_event_open(&(0x7f0000000180)={0xfffffffffffffffe, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x200, 0x0) [ 461.905957] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 461.934071] hfs: can't find a HFS filesystem on dev loop3 [ 461.961362] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x9effffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 462.122768] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:07 executing program 6: r0 = add_key(&(0x7f0000000480)='syzkaller\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000500)="92c200482a91bcb3277a8438a76cc20ab94c020c2ea76d79fc", 0x19, 0x0) r1 = request_key(&(0x7f00000005c0)="7472757374650803", &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000540)="0200000000", r0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="b238f409402cf39f414113793e75c2409b773e5557c950b3476d2f0e6987cc666925d8879dd471fdcb79fc71a061725fa677afd053b792b72f26c178e964b30f32251592dc6c471203eb3d193e7ce860c66592e971eba66cbf04c573666463782deef1f8ee424d83e3c1e07ef0962d69bbe45ee5b15456c4025945f6b47b43afddec7a1711211cb8e26bb3ad60bc7345664000c3cdfe583e64dd125ae31e51", 0x9f, r1) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getpeername$packet(r3, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000600)={@local, @loopback, @ipv4, 0x8, 0x0, 0x5403, 0x500, 0x8, 0x305e305ed489da12, r4}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) signalfd(r3, &(0x7f0000000000)={0x53c7099a}, 0x8) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000040)={0x2, 0xc}, 0x2) ioctl$TIOCMSET(r3, 0x5418, &(0x7f00000003c0)=0x28) 15:02:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000002300004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x16, 0x50800) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000200)={0x7e, @broadcast, 0x4e24, 0x1, 'ovf\x00', 0x9, 0x9, 0x42}, 0x2c) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="00696f64c5237075202f696f202963707520"], 0x12) [ 462.168349] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x6800000000000000}) 15:02:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x55000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x3000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 462.420798] hfs: can't find a HFS filesystem on dev loop3 15:02:07 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000040)=0xb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000340)={[], 0xd9, 0x4, 0x4, 0x3ff, 0x1, r2}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in={{0x2, 0x4e21, @local}}, 0x4, 0x1a, 0x3f, 0x5, 0x6}, &(0x7f0000000240)=0x98) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000680000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4000000}) 15:02:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.swap.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 462.554670] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 462.611100] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf0ffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x2000000000000000}) 15:02:08 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400840, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r1, &(0x7f0000000040), 0x0) pwritev(r0, &(0x7f0000000480)=[{&(0x7f0000000140)="f7a7e048cd476be143b1927a758267e333cb63243ff5a6664cd7bd6fe2f6cea1457c570d118ebfc090e27746d3ec1663747cf6de17809aad6b66ce8a502bc536f1429e2ad3be542d537a4d7d12fe619912a7b572a583e0bf723a23326a5d2db503da03f7ef8e17d707f7cdc44b665cae6e124d78e8572f0cdad44361b106dbd88669372e03f3abc1c23dd3e6282dd3df7b3acd9739a88cec660330d5ac58b2fcab660e7f459446a919d08301db890f23df75015b11b03323dd132d354510090f52f011b5154f5e7079d2625927535ecb3e0d8784d385b4ac17e3e440db389cbf197255d03a22270bf5af77584071ce1965711e9311de5d63ea177e96454522", 0xff}, {&(0x7f0000000040)=',l', 0x2}, {&(0x7f0000000240)="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", 0xfb}, {&(0x7f0000000340)="9534683c1207bee32171ad4258c9fc0cab9b8b99f50e105b33c98e817da258c64bd68603a86dee012e243b56b5ecb26a6fe40969eb5f1077457cb8bf1dbd46502250b71caca46809600277bb8de6d31104eaa0f1966711203ca8ae54f1bb6ac79c33cd8963566c63098ce1149f7aa8b02945b4d456f1195e7a5724240ad9066cfa2c00fdd8198594d0f696722f7993eef1d1e79669efb1cdeec4aafc37c8b5cfb80dcc01883b3cfe24fea7807d5320914eb643f5db3e853e42ece2e1d6a64f22d181bc4c", 0xc4}, {&(0x7f0000000440)}], 0x5, 0x15) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:02:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000090000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0xfcfdffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x300}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 463.046327] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:08 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) r1 = semget$private(0x0, 0x4, 0x40) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000002c0)=""/211) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x700}) 15:02:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x957}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$P9_RSTAT(r0, &(0x7f0000000080)={0x5b, 0x7d, 0x2, {0x0, 0x54, 0x1, 0x3, {0x0, 0x1, 0x5}, 0x40000000, 0x7, 0x7fff, 0x2, 0xc, 'cpuset.mems\x00', 0x4, 'ppp1', 0x5, 'eth1]', 0xc, 'cpuset.mems\x00'}}, 0x5b) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x0) [ 463.079600] loop7: p1 size 117440512 extends beyond EOD, truncated [ 463.105304] hfs: can't find a HFS filesystem on dev loop3 15:02:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x30000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000100), 0x2) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 15:02:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:08 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) accept4(r0, &(0x7f0000000000)=@ipx, &(0x7f0000000140)=0x80, 0x80000) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x1) 15:02:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x14000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x3000000}) [ 463.479485] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 463.514246] loop7: p1 size 117440512 extends beyond EOD, truncated [ 463.551693] hfs: can't find a HFS filesystem on dev loop3 [ 463.605607] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:09 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) quotactl(0x800, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000140)="ed3daeab8626d5927bdab9e043a081465fe12adeb0ce24ad863ace9a42e9ad2b02ab7ae7fa6c1c0c2c19a815abc0f27ebf2fe34d9041567a9fe53a95dfc08043829b721a361481005eb3b260c7f07fdaa923454969bf5c07ce501059aa364cbcb779a58d942c9f4e5340085da75d5b849cd61d99b6f9065990dea8f969dde4ac6d3afde938d6fff84b4ec62d44ea3c1de9a0aed6b4e1bb92ece390ffdf0f") writev(r0, &(0x7f0000000680)=[{&(0x7f0000000540)="a9da80a92ec9e06bfd53c7e2311398347fd21b8db73c61aa70504fb2527c5e0e4fad9b348e62d166be9fafa8bf27230efd13c1966eeb098ffeb980e1033975645916c24cd559260b1fd9440444e40617b897c60eb62607f3bb", 0x85}, {&(0x7f00000005c0)="86a5578c2d00a28da783e1eea57fd8515fcca083660ac79e12703f35fb9269400390b9e1adbfeafcb5c2b4964e3473078b61a5318aef45d76f6ec8990332f1c8d9037e9639271942fe65cde7718e81d97892e90044ac1fa5b746a36493420daa87dc21dce893e9bca98473e00bba8271ce9b21e937e9a37fcdc97a11b6ca2ac81a67ae6884f7bcdaee09d246e5a94098bc6dbcff9d319a1821d7f472f59583c49917877582828532280b6394"}], 0x1121) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000240)) 15:02:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) 15:02:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xfffffffffffff000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 463.681925] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00040000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xfcfdffff}) 15:02:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x6000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 463.939065] hfs: can't find a HFS filesystem on dev loop3 15:02:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='uid_map\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x90, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x70cf}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) fsetxattr(r3, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f0000000100)='system\x00', 0x7, 0x2) r4 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x8000, 0x8000) syz_read_part_table(0x4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="ec1757760851ccda20eaac1b46aabd1585b563fab341c429b4055a512e8cfcfe94fdb5ac0ab358fdd55156df7bc4b00475c4276e4b8d4fb21ace022ace673260521c3d0a8134", 0x46, 0x7}]) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x0) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f00000014c0)={0x6}) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000004c0)=""/4096) 15:02:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x2}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:09 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000040)={0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) mount$9p_xen(&(0x7f0000000000)='/dev/rfkill\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x208000, &(0x7f00000004c0)={'trans=xen,', {[{@dfltuid={'dfltuid', 0x3d, r1}}, {@cache_loose='cache=loose'}, {@noextend='noextend'}, {@cache_mmap='cache=mmap'}, {@access_uid={'access', 0x3d, r2}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}]}}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000f00)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x10008000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0xe8, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6e}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x1}}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x12}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x36}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xab}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}]}, 0xe8}}, 0x0) writev(r0, &(0x7f0000000c80)=[{&(0x7f0000000540)="b3f28695ddbc48f1d2b46767e78e853f9f6fe098faaf5b01f87eb25ea3985b823061465933163f581b5af9351f61ae21bee610690d019b0f8c13e95ef75f806ca7c67d0eb7875713463929ab38a44367dfd12f97855f1006fb3b703d78f101272b24ffad8ce8c37f136d08f863a0b544ccee7eb320a729d1926cb54aecf7c75c0b14115b954459787bd3196266128511381f86a434f0e38321ebd7f3ebffa937c4845081f502d573df3ff1889b2944c20e20ad0719616e99a62985edd10a36248068e90e6df4cde53716fe419b12f0edcee8612e2de2e2f54347ed479d14c0f6758e", 0xe2}, {&(0x7f0000000640)="c6a8acab", 0x4}, {&(0x7f0000000680)="4f5aacffbf96fa114175fbc60c0ad27f1f51f9ec4855681f8c8aecaafb949f46c0d73293ec42f03f16bebf8267360d7d2a3463de66ab8fb9ddfef33f0810374925b24e", 0x43}, {&(0x7f0000000700)="1d539bdf9ce4b0a887fad7ac083102ad8b90415e6068b00f7af3269672f0abddc20f78f7", 0x24}, {&(0x7f0000000740)="28e6e8953559051b751f640a8dea72ab2cc55f834f616fefc528319f54c1c7fea9a63012a59e1b11b3600d35fa1fbcba93b1626a91af0e0070a7536940cb369a57bbad4c22bc0a85182b4127a6be7ea50b23c1966acd72b2d63a1aacbe1c3c2148c4e94576184e9455065648b21ddc56a6c6b788ea2b0e19f25d7f91318de46cad9980c6cd3bfb5162dbfd097d0b67cb291c0fd929b65227c9f2d78b98f5717179a225ba3d47e5aa0895f333af6b3d5f559ef9648ea15923b4d569240d1d02e30234dfad4b2b3014cce44ce0ba", 0xcd}, {&(0x7f0000000840)="d454780f57ca86077ae87331761117707a43043ee7103b0b4a17e0fce58d9868822ca3646123f8dc828a6ebec435e70ae30ebbb6ce7925e332729fccc0e95d9b3490ce761a74f975fb0d1913668fe3f15d8b69f7ded292d1351e5b48deaddd21f7dfc591c0c65d02221c6d0ed009abcfa3f2a9c1eafd57d47d7f5fdbc1541270c302f4518f899bdbb5b0b0a038acbab915499cb39791f897b183c7036f3d30a92a402789fabae43d130926fe7284b0480bf1b2ae4f4737222a4ef3c3ebaa08b8860f00934cdf", 0xc6}, {&(0x7f0000000940)="060feded012c53a21c070f82617bd6774be7da610bd5b063013e4efe005606570faf55a2481267e4426f039bb322c10cc2435ef2f25419e143d0f19d38f91975fa122ec3af3ef5b41cf28dd04e3f142ee2ed39da22bd6f1fbd935febe7cfd2065c5856f7ac9aa23b024bf45e4e6b4d44a116f9aa6f307ba929cf92e9616567d471885e8c435094a9b2ba03daf9dba404b5eb1806a597f328a7b01b465f5cb6ee89b93be5c35d85a9f1b6729af2c90a8eb25ecb6e38babb4a96184034dba935968df75766a8213a57ac9829ab94a511fb19bb3d8baa57e67f", 0xd8}, {&(0x7f0000000a40)="140781bdbfe3221bc4373cda505a53cc2815cb989d203e201d2e3e44fa6d5b445e5e47a7ca7eb8348f21456074335b224f56658d46192eb5ac6ca6387764b372dcf513511192f7a5f79d2d1d754c46b4664d94ac0cae5861737e9eb92e9bca5a2faacc151f8c5375ebd75e02b3620a9d2d998a5bf47204903a2b7a6812c4f51b4423750806066e852f4b9437124478d1a7d191d767fa8f07c1350bef413566d996b7711f23aec62317ad5233b089d71abe1a75314c20514258390a24e822c112cd6100568d77e7612a1e1511372de6982b816aa6cdce869fc87d2be0b14c56189692ce4b95fc70230155439d", 0xec}, {&(0x7f0000000b40)="e7b959bfdba7365ab840c44456ca2523b39ea40aa01f152c21cc6e9bb472e86caabea6d8b7dc1a2b01c9a25833b916ec13938518eeb50a2e0e2ac8fee236a32f4641b532c52729597988a19209", 0x4d}, {&(0x7f0000000bc0)="ebaceb311a3ef7ba66616625bc8113174b04d58cc5d5d89567e32847575e9cd5416f4b8aa8b532accae524c7aaaae14a1aa166ccf764124f3e20f48fe411b3f5567da1b462620460f191667e1d8419d3787cc0faed54eee0cf9104fcf739519377d1fdd7e9e7164f3250d49def31b138028db8787ee2660cb8156cc63377817b7453b733eb", 0x85}], 0xa) 15:02:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x6c00}) 15:02:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 464.080844] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00231f7dc339e55e1c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 464.142247] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xfffff000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 464.283479] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 464.288450] hfs: can't find a HFS filesystem on dev loop3 15:02:09 executing program 6: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl(r0, 0x8, &(0x7f0000000280)="99f142ba2f3475c02b95c6351e8ef007d84e7b881f19d5a825a21136d7f38a824f4dc6369dbde1c79200add7c1846600a70fd9af30d58af21b42601b02b4ad6ebf8d9df8bed22a3c7066d4f9befcf653bcaf9ec5fc836f289831f7037d92f6069f65474c675eabad35c0cf96cf81f26eb86b9d588330defc6df235f61b7383f5200a98839086f955e7e415b27701b516800e19c175444e0e5f1644095ee7789938acd617acce795132ab5a74fced1f58802d8bd99c4ac23f752cbe2381f0be89835b57ae73b4b0c2696a167692e60a0f58f20dbf6c3179f9bbd1bbc47ebb50468412d44b6491e557036ace6ce5799019dd03f113070d84aa7d6d03b365844fc4f61cc15cf803d5dc095237fef040e01246637e133a2b87e6c351b9448181af57e9d69030f021f9e895d1992dc909c47749e8e5fd7fbc7e7514c29593d252dd55082d38d85baa1f9849256f94e2661671cae2915002d830f17c06bbe5bde524f8782c3825cb591415c9ac08944a61173e7fee48ab6f5349740054418fb9795ddb24b4fdced8d52c0b3066287b08d5c129266e0ac4d5151a45fee0d9705196044ec931771718b02876d753690e02825039b13ed17f8f95dd10c64ef23ad562422270ed04d0857f79bebb05e6cb81ba8fb50abce7081c04c7bb43b5feeee451087c53d8f80683d2da5d91fb497f756d481bd2811e3cf8be5f7d623946c6fb5ae70aaf5f229921e520ad08ae5c8cf3d18490472d13b512ce195112b053180c085f818c8efeb2b64aff4252557fa0f8d8d410f332ad689cc942fdaa48a1a6f6af6f47ede89d3b4f3e0d8c28b33583b3d8071f66d3c52f38097af71f8691c7e6bfddaf630c9cc18577995b86433cda74aeedfd46f3b5573ea1013ab8dae3df87d5e4668b4625e668511adc74ad2b0214207905eafe632da362c8474d91812a2fb54380b6c467c89700518aabd2d9976d48e9c0fd67f6739b88d8c0a8ce56e6a1f889ef9ff98b38de3a4312d195e5c1bbc8d1fa8e0e468700647ce7b0f1fc013f05afb0bfa33f778e1559aea0586875f09968888a6d996d4bd2e13974d505a766ee0780c8a998ca0b710f9128bdad42b31bb267373a38bfe4e32595d9c6d2de7db25a08ec9fdc866ac29083bc2826e5ff1618b7739a4d6be32f44ba130e1afe5b481f5923c87e11f98120466779b4872086c84c4bdefba448d4e88bfa2c679a08029dfe3c272fbd320de6834957858107c6d22312e120d6ed0c5e5dad4087be5c2305d7d3d724a579388a970c5108ade94c4d2d4f7144a5a2e7c62f9f0941fe54f275823223d6bfd7c3fb116dbd25649046260e6348156aa1c7f2ce9167b7977d914061ec358cc2ccb09da26db063a148b83608dee8a5fa8b28af436712259e3a18a4f5af8bdc1e5c2d6fac4ed96d04d6002ed61fc967158ca85b578e79c9b90bf4e731ba0185b21d7348b88ddde4072ab728b8bf9a28275fe881d5df1af783a5f63e23553b0bbe3e5da1e09bc09253980c6765c4d3a7f88b317ed438ba170b3607926b8f6ca1d13ebd8dd6b55d8d906ca464f1da410576cf58fe837fad3fb0e1079077ac6d781c896981f13a57b85b6c8c93e52c50dd428b4c5ff8339c70918a66485fb21193d621ec4fb0b32de180963033f90a803fc16ebb3534dfadf7fe5c59943a15ecac93e4b074efe3d58df4d75c12db55f8520ec951ba1a98fe850b236ef58a1aff0a9ae23a237912ce412b456a8f8755a18dcb63ceea557d5190eb772c1fc24f04ce0e4ca60423f193153abeb41e8ef412b980812474bd3ecf039dba1a81e59a8692ff16de33062a68113701f5b4e599b175203af634f086e3c485ffb3a7c7b24ad30762a3fb536bc5dbb24b76f0cc319bc30c22ba4552d298c2d25847bc2708034a350ee4e01e2ca12f07a49f8f1cd928d9eca31ff701acbb05f47e73252d9a720c10e7dee927402df0f3cc946fc8b2e42c5c00aefe5bb80c35350dc794808408d747051ccf1b205a816fa8a21ebcf9007c760666a763becd2b3cc8b58957c1889139438f029cad9435178424a6df191191f567cc3b6e1b4a7095f7745b4f0285b5851cafd403711d808dd2f592086b3bd6f8a74198d0ba9a8c9e4f4a41625e7a460604ed65f6a785fe7937c45a6e3394aa71f512d6a42d3391692c343651b2cbd190437d36e17a633494e3e128e42eb0f133c608acc46ee2008ec94257a11a257342d0d798a1a0ea850c3e36bc85af57455e2f11e66265916416cbef6c9f580dba1f399267932b3f9d99d2861edcf17018d7de693c6f98f65a3bfb8cd04a1e5edbf660ebd784de90c22faba62ce4c7c39a6cf969b4c94137b095e90ab8c504bda26bbaa28f9a1b4a5fcd42752c58532b00627983f008d53865b8763a0ead289ad1ba34933c5dc04c5e98e02da76498c7fe61924212814aed45161f159c524c912e1a5ee9bd76c5d4a5dc218b59879fdfc741d17ba808a0e1af0af41a54441aff12f8e4f6f14bfe9b1a23ce82434be29d3bb5c2392245a49f835ad3cbfe705be0278e216a02b979ba2869c63f0f8b4904da9ae2fe98cee0006f5702d96b43e4384ad36eea82be92af0e45f958c9ad42a8f1d610bb2d16f330d5fc395df90b8a7d6691053434d8f57acb23cbe97e60b2118d3b44ae50a5632edc57b3546bb862836f2fb5117067d7a92d5c30b07169fb937f15ed94db5e68a315c2e2526dde2e9acafc0ff4bc208f1de9fb0bdad6e960c8cac525fff56132dd1cb715ff9c355c9e600f4759a21daa053f0a580657e7d6018775da2c95e818c540dc0b055b42d7a5d8e6407c6953af3be111ab8fde4e3679ee2ec95d447582fa0ab3a3b50bdd907627cc5ea197c963225057ad12d64e449775185e8c59b0182ad7e3d858da05d474d77e44c4d6d0dad9b7087f79aa1881ecd58f5a5dd81d03e94f1fde218e1111ff8af64ab7020aec608d414d94e2d67fbb30f21406bb3c591e4e5d903aba272789aef5c476b1d59bf1aa0cc093cc2d9f34ee5ba4dbd8620b87e4f857013a302b84a2d1b97a90ca0897c3c038dc39996954b6363762d5de49d737f69e88518c8f6ed550ed86367c48edaf54f99ed81c3673f9fa0df65722b1f333b4ea777a2ff71ae703588c9220a1d077ef3e34db8da675753f7884c93a1405403b9728507546b1f8e860b1b07378daf5eb8337ea22057111d150f546aa8a5fd0cb1b6354e30bd9e4a8d159f760c0e2c84c28d00e5f0891d8a0504faa6d01c8dbc792bbbffee91652aaac9be91afc76c2b8107fbd72ccd3d56ac1574620be1fefd61e1bcbf7aab007337918d39df1a9c671ab37a92df1d8405b72f2c0a2ec9c6b815ca2d9fcd591b315e80651b9d773411ce0d4869dc5633e712fe7bb55741f4c7dd8bf04280dc7c20fc5a694521d34f1ab37668d8335061f85cf514970ca78efc599a31f1ed2b4282420b921688e571d304f673594358145e60b1b9c2aac1deae9b2f2a9639a9c05fe2e42cf4c9d7d16ff9e68d82c4185562cb2a832f64f7d282a44a9ec3e1115a42b50e9eba1e4426170ec09924b09c5c6e57d3c1019178e9dd73ef01618bcd06e20c60c15d5c7745bdca5f24cb4abd69e0aa8c6ba2a3edd9ade4cc5056afd69a020faf36c547241d333cde9a39600718b2cd6418301e03d53cdbe6cc19418a4b916e62aaaf55c9f319a66fc69027198ded090bd8e5698fb5c6926b7153aa418a59ffd0abc23c53cf4189333f01d934baa12a142b76ae3af561a75bad95b119ce2833506b7952e2b27cbf683d78514e3571d6d9ec3983c6d53cfcdc6789e82bffd693cd15b36d158b93d597b7a9ed903a63d2bdbf57a86dcb4ad6b098f5d1de4770a5cbdf0371b562aaa7c7e20499788f8a9da07a5dbd482756e01d89904b1e3560fa742733b8d123e60077d435692c74bdb8e26c834791b3800f93d9622badf15b46bb4b85807c6e29675160d4d8cb6ca7b171d2fc7c8fb2946541f2144cf93d9f6973ae75cfab5ccd8122853acdf72a919a4c32d805ab27c6a5c1d5fea47f959ecde87b5fcdcd528d605a88ec70629760a0b2cd435552c6a4dfebae075db5540b029881d4f386148843a34161ecb7db9f6eea877bdeba00486d45331d934e6f556ad8a5db4e0a668679a332da62ee706a3db7c2776b51e0246e6c27a81361b16d036413cb54102deff0676f46a77c31a705cfc7447d23dd915df3278502f8d188e447c95cdedc8f99582f2a654c15c55a6f11812645767d4026980a62e115a98be506f5ac20fc52dadd48e5cce0ad0692661f0b33eb37cd8d704269b150abbec6c95b08e578c964c87672ed2cba300c520cf08de6576f1b094891f79a7e992b5f8bee669cc45dffac7af2c4c63c925bf8c9fc93036da22e01181ff6664c1839efa038f6511c2bb236874ee6968af0eded628eea0cc8a79ad66c71cc14b97744a3c1621019caab109103f4a6f8b4b7a5fe976e4b25c2cd240954a409e13886b9db4e95afde9febfd4d17078e9324ac012cc98318c3ef1347327d35cc7454ae8feedce86728316e7b9694250c4eb1a15eca78ec597d5b19e6c04b61cb098831d62187a18203984c6566d48d0500c9bdaa0b9d1fbe6797c44e36f4f5b4db8f1a3e08baca9ae41907e32cb854106bb116878055c130896306294fa734d2ddf8d083aa6f8bc2685966dba32537ec57518b0f817488b2a15334144b891f78cf0af1a0a22ddc040f9bca09c2d13a9691130e23b8f0064c13e4fba4efca04831fe47203566ce1204be491883e78ec555f92c0d5f2c20cbc4de2dfbbb1ca60a102448c5c24a8ae147a8936d0f227dd4694e0161f0615946e9ca98d3f75d30618f3f1f2571f6235d41ac11f9ab52bd9dec7e863185427817db579c7b2a30efd062312ba4acf0534d2d68131a0a79d06123cd6ec0f20919a3bbc7af8034b72323c5a0415ac5162fab14d036f923a639cc3a7c163c1351c0f1d60bda884d2ac17aaa85f291304d442fb0c71fe5ab7da27c027ca0f847bb07d31f646093c4198d00c33cd72739ae4698c84a980e629b7167b7a5a3a87897a36d04f9c270829964cbcff503313f3c93dd5818de2dd6c6aa384b4d4d05c1fc3bf025976190a305adbad77a6cc8a08bff5a27d0037c67228afc163ccfb04796568250b83b22ef870d2ada60b4187af4dcaf2250757a83234b79d6b4240de592536946be9943029942f77c53e0b65aae47c2132eaa939aa68a7dc45964deb110c054941bcff10a2c522302ae01252b88d1dd299e12bfe49e1e5939123f0a7bd5dff41ab8e1c081d19591acbb41b8fc092b1b3f6578b991740293af111ba1443bfbe10840a3768e6de7d8e0c2e8b4f0fcacbedbd5cbae5abea3abadf445055dc97ed06da1fb920c7ed96ac14d649ee515417a56364b1afc076952ebdd51c4cec773de6d79e8051318b722003ac206c0f2b0c3a789c018ddcb69b5d86acfa3eb11377a57d55dc19d2522f8f03cf02d906ea6ea32b516945b2847b476e9e3e4cefd9f07f057339877db70b8dba34409563f537d08e625f5544306d3a0f310ac30c28007c55692b932151ad76985cf2f30c3529362025e35701643ac09ac351c465b13080162e8f88f3aeebc7b0c799a448022c513de3352d999f2a81d2ebb60514c5495bb569acedb8ba92f7d81d7025505b7279cae25f1e3fea6fedfae1c3219564f14e6d8387017c1d692d2ce368c9868983d8e193a4ec94b0bd35667f36df6691387157750f5de498e06dcd899f2f5b017ac3880bc050bdce0fd372f0d57a7ffb8fd4106b77fd2202b2ef32d") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000200)=0x7) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r2, &(0x7f0000000280), 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18, 0x0, 0x6, {0x8}}, 0x18) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0x100000000}, 'port0\x00', 0x1, 0x40010, 0x1, 0x1000000000000, 0xfffffffffffffdde, 0x2, 0x4, 0x0, 0x1, 0x1}) setsockopt(r1, 0x8000, 0xfff, &(0x7f0000001280)="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", 0xfb) 15:02:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xe909}) [ 464.360686] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000230000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x62}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 15:02:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x4000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x93000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:10 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000002c0)={0x138, 0x0, 0x8, [{0x6, 0x7, 0xc, 0x7, '/dev/rfkill\x00'}, {0x5, 0x8, 0x2, 0x3, 'lo'}, {0x2, 0x82, 0xc, 0x20, '/dev/rfkill\x00'}, {0x0, 0x3, 0xc, 0x100000001, '/dev/rfkill\x00'}, {0x0, 0xffff, 0x0, 0x8000000000000000}, {0x3, 0x4, 0xd, 0x6, 'em0vmnet0self'}, {0x4, 0xf54, 0xc, 0x37, '/dev/rfkill\x00'}, {0x1, 0x0, 0xc, 0x3, '/dev/rfkill\x00'}]}, 0x138) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xfffffffffffffef0, &(0x7f00000001c0)={&(0x7f0000000140)={0xffffffffffffffe7, r1, 0x10, 0x70bd24, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x1) 15:02:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xfdffffff00000000}) [ 464.716331] hfs: can't find a HFS filesystem on dev loop3 15:02:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 464.848711] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 464.925250] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x278}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:10 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x7fffffff, 0x2, 0x5, 0x401}, {0x2, 0x4, 0x5, 0x4}, {0x0, 0xedc, 0xffff, 0x8001}]}) writev(r0, &(0x7f0000000280), 0x1000000000000041) symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x1f00000000000000}) [ 465.083561] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fb", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a007a0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 465.120106] hfs: can't find a HFS filesystem on dev loop3 [ 465.138143] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000100)) r1 = msgget(0x2, 0x44) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) getgroups(0x4, &(0x7f00000002c0)=[0x0, 0xee00, 0xffffffffffffffff, 0xee01]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) r7 = fcntl$getown(r0, 0x9) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000580)={{0xffffffffffffffb6, r2, r3, r4, r5, 0x3}, 0xfff, 0x18000000, 0x1, 0x4, 0x6, 0x4, r6, r7}) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000140)=0x40) r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}}, 0x0, 0x0, r0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) writev(r8, &(0x7f00000009c0)=[{&(0x7f0000000600)="e53b97a0ef2fd3d0ae18fd43ecdd88512baa96ee93e4053749262bea6ecf3e0657480b8cbc6974a2ec19938331e946db26f0b205cdade3914157ea50450a50d77d0121a4bc55fb5c49b1d7c4d0ab6e8494e5d2337e777f85da2799f9705735aac4744b64d1106bd37903bafde6d43cc14d983ef6d0575e0db141c2ca3078b630eca51f99bc53f55e4b562a41832ccb38949a31cc17f096a9b52d99b6fd0cb00cbb5b12d8e994a53f1e1e63e7065e5a5ac35864d78e38b13835928d9656e3253525003b5a8737af3f51370b0fab9f07507080145b0090b1da089c0f568680", 0xde}, {&(0x7f0000000700)="27835c82de03328ec4afc4cfbc4cb7dd25572f857c8a0614079901556e40996e314033d4ee51d0682207442e53bca6145f900f27524929a065de6ecc24ed8628c7d5c9c53564553c2221c7e5ad50de727c8eb024d9f333ac51f3fe8916f2ca57f933b9296106b0a61f98ec22d0884063b3ce281074b8ab14a0865ed519844b3f638d0a1d6f17e89c3ee1053cc36db98c9b2c5b87457088686836ee97b647d4757d1594fbe5d506f28dc1a5acbc69689f7693726a4a3674d5bd0a97a5858ceac8611900a867fbadbd334f3fdc5e54a1d8406f67ab8679942dbfcfba736c25b80fa84aebe5aa2523fc301d3cff9a5d256f36a0a5f7b7d648", 0xf7}, {&(0x7f0000000000)="cbb4", 0x2}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="ca8fcf5cf8ec16229e4ba485f88041f0989ff583f529ef022d5ad5b9946ebf3796fcf7ad9706ff0703171ddf83d5903a2cbcf6b5e4c376c1a1d084e2668439fcea14babd4c78cb581e", 0x49}, {&(0x7f0000000980)="eb72d21d7667ebae8fea797cad9ec1c53d3985b70d15b9ce06e28257f256cd05f74cc6e9d9be93e710c604574aa4b38015abae", 0x33}], 0x6) r10 = openat$cgroup_int(r9, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000080), 0x0) 15:02:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x6006}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:10 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xffffffff00000000}) 15:02:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x10e59, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000500004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:10 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x800, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000100)={0x7fff, 0x401, 0xfffffffffffffff8, {0x77359400}, 0xffffffffffff6e08, 0x63}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f00000002c0)={0x1, {r1, r2+10000000}, 0x103ffffff, 0x3}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)=ANY=[], 0x0) 15:02:10 executing program 6: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="0b0900f5000319", 0xfffffffffffffd98}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000240)=""/233) 15:02:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x400000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 465.582298] hfs: can't find a HFS filesystem on dev loop3 [ 465.643559] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 465.684112] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x7a000000}) 15:02:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffff40000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x20) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x3, {0xffffffffffff1a4f, 0x2, 0x4, 0x4, 0x80000000, 0x1}, 0x8, 0x3}, 0xe) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) [ 465.825580] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 465.845593] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:11 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rfkill\x00', 0x101081, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000001c0)=r0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x9}}, 0x18) stat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000500)=[0xee00]) r5 = getgid() getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getgid() getsockopt$inet6_dccp_int(r0, 0x21, 0x4, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r8 = getgid() getgroups(0x8, &(0x7f0000000600)=[r1, r8, r3, r4, r5, r6, r7, r8]) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000240)={0x2, [0x2, 0x80000001]}, &(0x7f00000002c0)=0x8) epoll_create(0x401) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000242000/0x1000)=nil, &(0x7f000008c000/0x2000)=nil], 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x2) recvfrom$inet(r0, &(0x7f0000000740)=""/19, 0x13, 0x40010000, &(0x7f0000000780)={0x2, 0x4e22, @broadcast}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)={'filter\x00', 0x2, [{}, {}]}, 0x48) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) 15:02:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf0ffffffffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 465.955680] hfs: can't find a HFS filesystem on dev loop3 15:02:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x6}) 15:02:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 466.034962] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 15:02:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x10e5b, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673f4", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 466.143984] EXT4-fs (loop5): invalid inodes per group: 3221241856 [ 466.143984] 15:02:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x78020000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 466.273058] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 466.285157] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 15:02:11 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 466.330301] loop7: p1 size 117440512 extends beyond EOD, truncated [ 466.337699] EXT4-fs (loop5): invalid inodes per group: 3221241856 [ 466.337699] 15:02:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x8cffffff00000000}) 15:02:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 466.463453] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000100)={'veth1_to_bond\x00', {0x2, 0x4e22}}) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 466.511926] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673fb", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:12 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1, 0x4) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x2a00}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x2010000000000000}) 15:02:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x590e010000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20800) write$tun(r0, &(0x7f0000000100)={@val={0x0, 0x86dd}, @void, @arp=@generic={0xffff, 0xe8bf, 0x6, 0xc, 0x4, @random="89d19251fe9d", "c701646c4fd7001d85a7b8f2", @local, "e7d5cc042147b46077541ed77e92d6ad"}}, 0x34) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) [ 466.916031] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:12 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1d, 0x11, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xcb72}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x691}, @exit, @call={0x85, 0x0, 0x0, 0x3a}, @generic={0xfffffffffffffff9, 0x3, 0x1, 0x101}, @generic={0xfffffffeffffffff, 0x1, 0x1, 0x7}, @generic={0x0, 0x176, 0xfffffffffffffffa, 0x2}, @jmp={0x5, 0x7, 0xe, 0x7, 0x5, 0xfffffffffffffff0, 0x4}]}, &(0x7f0000000380)='syzkaller\x00', 0x800, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x9}, 0x48) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) pselect6(0x40, &(0x7f0000000000)={0xffffffff, 0xf57, 0x3, 0x200, 0x0, 0x8, 0x7, 0x3}, &(0x7f0000000040)={0xfffffffffffff801, 0xfffffffffffffc01, 0x5, 0x80, 0x6, 0x4, 0x584, 0x8}, &(0x7f0000000140)={0x6, 0x3, 0x4, 0x5c, 0x10001, 0x2, 0x3, 0x9}, &(0x7f0000000180)={0x77359400}, &(0x7f0000000240)={&(0x7f00000001c0)={0x6}, 0x8}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 15:02:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xfcffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 466.970182] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x500000000000000}) 15:02:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a001c5ee539c37d1f2300004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 467.109499] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f0000000140)) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6103) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8)=0x3301c, 0x8000fffffffe) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) pipe2(&(0x7f0000000100), 0x0) sendfile(r0, r3, &(0x7f0000d83ff8), 0x8000fffffffe) socketpair$inet6(0xa, 0x80004, 0x1000, &(0x7f0000000080)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x0) [ 467.164205] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:12 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x4e24, @multicast2}}) 15:02:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x80ffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x5000000}) 15:02:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x5c0e010000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000200004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:12 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)="2b73bb23b777fa682de033122189df20cb"}], 0x1a7) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 467.597337] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf0}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 467.619430] hfs: can't find a HFS filesystem on dev loop3 [ 467.631193] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x1f00}) 15:02:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000ffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x2a00000000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:13 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 467.978090] hfs: can't find a HFS filesystem on dev loop3 [ 468.080066] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 468.139623] loop7: p1 size 117440512 extends beyond EOD, truncated [ 468.247706] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 468.277265] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:13 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f00000007c0)=0x6, 0xfffffffffffffe85) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000840)={0x2, 'ifb0\x00', 0x4}, 0x18) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x110000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r1, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f00000003c0)) openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000940)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000008c0)=0x92) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000900)={r4, 0x8001}, 0x8) keyctl$clear(0x15, r3) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000800)={0x8, 0x5, 0x3, 0x7f, 0x1}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) 15:02:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x2000000000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xffffff80}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x7}) 15:02:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000040000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:13 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x100000001, &(0x7f0000000140)=""/68) [ 468.441297] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4c00000000000000}) [ 468.470415] hfs: can't find a HFS filesystem on dev loop3 [ 468.497215] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x8000000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000080000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:13 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x7c, "f4361b02c25fe703197ba9b7b5f58fbf77d7d0bd7c864f0680e6c785e76b826655f29bdc11d1dad0b4e6b4b6a049f9af5cfe25a8bd571e1015adfa2f12e54413c287504bc4ee2d220b1391d43e758ccb3772afa847c8d9334852468591147d68395ce4f8f9e8143e977b3b444c2c811cb099459e44532031280f7570"}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}}}, 0x84) [ 468.622583] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 468.677987] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:14 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x58332e74afcaaeee) ioctl$VT_ACTIVATE(r1, 0x5606, 0x100) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2b, 'io'}, {0x0, 'pids'}, {0x2b, 'rdma'}]}, 0x10) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x401, 0x100) 15:02:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x10010000000000}) 15:02:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x1f000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000740000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 468.881487] hfs: can't find a HFS filesystem on dev loop3 15:02:14 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f00000002c0)=""/246, &(0x7f00000000c0)=0xf6) symlinkat(&(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000100)=0x56800000) 15:02:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x7802}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x100100}) 15:02:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x2, 0x400002) r1 = dup2(r0, r0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)={0xe, 0x5, 0x0, 0x3f, 0x1000, "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"}, 0x100c) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)=0x6) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) [ 469.122632] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 469.160305] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:14 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') syz_open_dev$usbmon(&(0x7f0000000580)='/dev/usbmon#\x00', 0xa3c2, 0x180) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000540)={0x7, 0x8, 0xfa00, {r1, 0x7}}, 0x10) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) epoll_create1(0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x2, @remote, 0xfffffffffffff069}}, 0x10000, 0xd870}, &(0x7f0000000180)=0x7b) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={r2, @in6={{0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0xe}, 0x5}}, 0x1, 0x10000}, &(0x7f00000001c0)=0x90) fgetxattr(r0, &(0x7f0000000140)=@known='system.advise\x00', &(0x7f00000002c0)=""/177, 0xb1) 15:02:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000001f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 469.264309] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xfcfdffff00000000}) 15:02:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf00}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 469.356947] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:14 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="08006367726f75702e6370750097a088346326cf8484bab7299bee9c1114eedf252cf5df9dbadc383f4139a8a87276839f9ee78fa96e52bdf91e3ba583eaedc38896d112f9dc03e20636a1171d70ceaaf0444c4bd25fa2ed7c8b41", 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) ftruncate(r0, 0x6) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x10000) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0x0) 15:02:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x9300, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00ffffffffffff070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:14 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x1, 0x4) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000000)) [ 469.586770] hfs: can't find a HFS filesystem on dev loop3 15:02:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x660}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 469.686599] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x80000001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e136a67726f75702e6e657402737900000000c76fcee78617693482b4a8002ddbc6130874dc34a7f14b781367fe916920c19babfe306fefc5a37b179e", 0x200002, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200001, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2f, 'memory'}, {0x2d, 'pids'}, {0x0, 'cpu'}]}, 0x13) r3 = openat$cgroup_int(r1, &(0x7f0000000080)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x0) [ 469.730331] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:15 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xe2000, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x8000, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23}, {0x2, 0x4e22}, 0x140, 0x100, 0x10001, 0x80, 0x2, 0x0, 0x9, 0x2}) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f00000002c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000380)=[{&(0x7f0000000300)="a345e9c986239a61777d602eb82a2fa85ba4faaa6a8ce090a9d3bd10ef3197684672700fec85e3536239efe97be3a7757fe0fbeae56d1d4484e9a0d35fd1bbd76313ee493a88ca9e42ba1767496d841be6eb052460ee1970790a11234a5580f8b5c6bf877351638437f9667d7c1b11840df9d43b4f93", 0x76, 0x20000000}], 0x1000000, &(0x7f0000000440)=ANY=[@ANYBLOB='data_flush,active_logs=4,noflush_merge,resuid=', @ANYRESHEX=r1, @ANYBLOB=',whint_mode=fs-basedrd,acl,\x00']) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000005c0)=0x1) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0x100}) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000004c0)=""/173, &(0x7f0000000580)=0xad) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000001c0)=0x10, 0x4) 15:02:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x74000000}) 15:02:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000006c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 469.895315] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 469.931220] loop7: p1 size 117440512 extends beyond EOD, truncated [ 469.939062] f2fs_msg: 2 callbacks suppressed [ 469.939078] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 469.950715] F2FS-fs (loop6): Can't find valid F2FS filesystem in 1th superblock [ 469.961602] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 469.968740] F2FS-fs (loop6): Can't find valid F2FS filesystem in 2th superblock 15:02:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xe8ff00}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 470.005692] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 470.012943] F2FS-fs (loop6): Can't find valid F2FS filesystem in 1th superblock 15:02:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x6e0e010000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) r2 = dup(r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x200a}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000200)={0x31, {{0x2, 0x4e23, @multicast2}}, 0x10001, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e20, @local}}]}, 0x210) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 470.050986] hfs: can't find a HFS filesystem on dev loop3 [ 470.082934] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 470.090123] F2FS-fs (loop6): Can't find valid F2FS filesystem in 2th superblock 15:02:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4800}) [ 470.160087] hfs: can't find a HFS filesystem on dev loop3 15:02:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000020000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 470.237467] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 470.259248] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x3}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 470.360022] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 15:02:15 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101081, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000580)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000005c0)={0x0, @broadcast, @remote}, &(0x7f0000000600)=0xffc6) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000800)=0xe8) getsockname(r0, &(0x7f0000000880)=@can={0x1d, 0x0}, &(0x7f0000000900)=0x80) getpeername$packet(r0, &(0x7f0000000940)={0x11, 0x0, 0x0}, &(0x7f0000000980)=0x14) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000180)) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000c00)={&(0x7f0000000f00)=ANY=[@ANYBLOB="20020000", @ANYRES16=r1, @ANYBLOB="a1be2cbd7000ffdbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="040202003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000700000008000600", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600a73184dfbc10ecab4c754f6ec34f0990492d2e7d3e5363a3d32e2158d56c35a1824dac4f", @ANYRES32=r6, @ANYBLOB="400001002400010071756575655f696400000000000000000000000000000000000000000000000008000300030000000800040004000000080006008b39219553a4c174a7904b6c7714ad4185c5d0be8ff7835980266a1b3eca74f628cc4119b59d489cc548a0c2a4", @ANYRES32=r7], 0x220}, 0x1, 0x0, 0x0, 0x4000}, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="0b0900f5000319", 0x7}], 0x1) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') epoll_create1(0x80000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) connect$bt_l2cap(r0, &(0x7f00000001c0)={0x1f, 0x5, {0x7ff, 0x80000000, 0xe337, 0x3, 0x7, 0xed23}, 0x2, 0x2}, 0xe) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) [ 470.420160] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x9e9}) 15:02:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000007a0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x1f00, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 470.566092] hfs: can't find a HFS filesystem on dev loop3 15:02:16 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x2, 0x2, &(0x7f00000000c0)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191}, 0x48) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000001c0)) 15:02:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x4}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 470.692105] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:16 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfsP', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 470.757980] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"00ac720000000000ec973f820f7c4000", 0x102}) 15:02:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4c}) 15:02:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00102000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 470.897551] ntfs: (device loop6): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 470.907622] ntfs: (device loop6): ntfs_fill_super(): Unable to determine device size. [ 470.949456] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf00000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 471.008801] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfsM', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000900004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x3}) 15:02:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x10e5f, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 471.179294] ntfs: (device loop6): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 471.189365] ntfs: (device loop6): ntfs_fill_super(): Unable to determine device size. 15:02:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="cd3997030f00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 15:02:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 471.397737] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:16 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000600004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x1000000000}) [ 471.445271] loop7: p1 size 117440512 extends beyond EOD, truncated [ 471.563561] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x14}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x0, 0x20000008}) [ 471.628243] hfs: can't find a HFS filesystem on dev loop3 [ 471.638321] ntfs: (device loop6): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 471.642522] loop7: p1 size 117440512 extends beyond EOD, truncated [ 471.648410] ntfs: (device loop6): ntfs_fill_super(): Unable to determine device size. 15:02:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x2010}) 15:02:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x5d0e0100, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xffffff9e}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x0, 0x20000008}) [ 472.007772] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:17 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) [ 472.055158] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000fff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 472.186695] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 472.215756] ntfs: (device loop6): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 472.225864] ntfs: (device loop6): ntfs_fill_super(): Unable to determine device size. 15:02:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xffffffffffffffff}) 15:02:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 472.259321] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xfffffff0}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x0, 0x20000008}) 15:02:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000006800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 472.416122] hfs: can't find a HFS filesystem on dev loop3 15:02:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x500, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:17 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x68}) 15:02:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x80ffffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 472.692052] ntfs: (device loop6): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 472.702137] ntfs: (device loop6): ntfs_fill_super(): Unable to determine device size. [ 472.754548] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000006c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 472.779156] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x1000000}) [ 472.845283] hfs: can't find a HFS filesystem on dev loop3 [ 472.896965] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 472.949302] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xffffff7f}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:18 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}]}) 15:02:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0xffffffe4, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffff500004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xe9090000}) 15:02:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x1000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 473.274021] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 473.285833] hfs: can't find a HFS filesystem on dev loop3 [ 473.313346] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:18 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}]}) 15:02:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x400000000000000}) 15:02:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000002000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 473.682430] hfs: can't find a HFS filesystem on dev loop3 15:02:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 15:02:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x10e73, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:19 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}]}) 15:02:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffffd00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x100000000000000}) 15:02:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="68667399", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 474.041100] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 474.089296] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x2000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xf6ffffff00000000}) 15:02:19 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@dmask={'dmask'}}]}) 15:02:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffdfd0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 474.249544] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="686673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 474.281621] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x97ffffff00000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x9effffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 474.641653] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 474.668813] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:20 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="cd3997030f00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 15:02:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x8cffffff}) 15:02:20 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@dmask={'dmask'}}]}) 15:02:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00006800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xffe800}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x680e010000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 474.972514] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 474.977696] hfs: can't find a HFS filesystem on dev loop3 [ 475.046253] loop7: p1 size 117440512 extends beyond EOD, truncated [ 475.065092] print_req_error: I/O error, dev loop0, sector 128 15:02:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x1020}) 15:02:20 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@dmask={'dmask'}}]}) 15:02:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf0ffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:20 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) r0 = syz_open_procfs(0x0, &(0x7f0000001500)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000140)={{0x5e, @broadcast, 0x4e24, 0x0, 'lblc\x00', 0x10}, {@dev, 0x4e23, 0x0, 0x8001, 0x59d}}, 0x44) 15:02:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00060000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x7000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) [ 475.399642] hfs: can't find a HFS filesystem on dev loop3 15:02:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00ffffffffffffff7f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x11000}) [ 475.459848] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:20 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x7802000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 475.499696] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="6866737f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) 15:02:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs ', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000004800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:21 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x74}) 15:02:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xfffffffc}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 475.921067] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 475.977282] __ntfs_error: 7 callbacks suppressed [ 475.977293] ntfs: (device loop6): parse_options(): Unrecognized mount option . [ 475.998431] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:21 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 476.156694] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0097ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xfdfdffff00000000}) [ 476.226036] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfsT', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x650e010000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667397", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 476.369822] ntfs: (device loop6): parse_options(): Unrecognized mount option . [ 476.448955] loop_reread_partitions: partition scan of loop7 () failed (rc=-16) 15:02:21 executing program 5: 15:02:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x100000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 476.505418] print_req_error: I/O error, dev loop7, sector 0 [ 476.524801] print_req_error: I/O error, dev loop7, sector 0 [ 476.530810] Buffer I/O error on dev loop7p1, logical block 0, async page read [ 476.540140] print_req_error: I/O error, dev loop7, sector 1 [ 476.545945] Buffer I/O error on dev loop7p1, logical block 1, async page read [ 476.554086] print_req_error: I/O error, dev loop7, sector 2 [ 476.559903] Buffer I/O error on dev loop7p1, logical block 2, async page read [ 476.567950] print_req_error: I/O error, dev loop7, sector 3 [ 476.573766] Buffer I/O error on dev loop7p1, logical block 3, async page read [ 476.581689] print_req_error: I/O error, dev loop7, sector 4 [ 476.587531] Buffer I/O error on dev loop7p1, logical block 4, async page read [ 476.595083] print_req_error: I/O error, dev loop7, sector 5 15:02:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4c00}) 15:02:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00030000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 476.600915] Buffer I/O error on dev loop7p1, logical block 5, async page read [ 476.608364] print_req_error: I/O error, dev loop7, sector 6 [ 476.614200] Buffer I/O error on dev loop7p1, logical block 6, async page read [ 476.621645] print_req_error: I/O error, dev loop7, sector 7 [ 476.627459] Buffer I/O error on dev loop7p1, logical block 7, async page read [ 476.635068] Buffer I/O error on dev loop7p1, logical block 0, async page read [ 476.642565] Buffer I/O error on dev loop7p1, logical block 1, async page read 15:02:22 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) [ 476.721839] loop_reread_partitions: partition scan of loop7 () failed (rc=-16) 15:02:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="6866738c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:22 executing program 5: 15:02:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x1400000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 476.833043] ntfs: (device loop6): parse_options(): Unrecognized mount option . [ 476.870837] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x7a00}) [ 476.957190] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:22 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:22 executing program 5: 15:02:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="68667397", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x4000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x700000000000000}) [ 477.212807] ntfs: (device loop6): parse_options(): Unrecognized mount option . 15:02:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xe8ff0000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:22 executing program 5: 15:02:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00740000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 477.436125] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:22 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) [ 477.457482] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x97ffffff00000000}) 15:02:22 executing program 5: 15:02:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x2a0000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x620e0100, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffff60000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 477.696279] ntfs: (device loop6): parse_options(): Unrecognized mount option . 15:02:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:23 executing program 5: 15:02:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xedc0}) 15:02:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) [ 477.910507] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:23 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x200000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:23 executing program 5: [ 477.990352] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a007fffffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 478.163207] ntfs: (device loop6): parse_options(): Unrecognized mount option . [ 478.172020] hfs: can't find a HFS filesystem on dev loop3 15:02:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0xf000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:23 executing program 5: 15:02:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x10}) 15:02:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x2a0000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:23 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) [ 478.455467] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 478.493613] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={&(0x7f000034c000), 0xc, &(0x7f00000daff0)={&(0x7f0000417e08)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) [ 478.536691] hfs: can't find a HFS filesystem on dev loop3 15:02:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x2}) [ 478.649450] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x6006000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) [ 478.684523] ntfs: (device loop6): parse_options(): Unrecognized mount option . [ 478.709098] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00e90900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:24 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x55, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xfcffffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x10000000}) [ 479.029230] hfs: can't find a HFS filesystem on dev loop3 15:02:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0605345, &(0x7f00000000c0)={0x0, @time}) 15:02:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00680000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 479.128325] ntfs: (device loop6): parse_options(): Unrecognized mount option . [ 479.152543] loop7: [CUMANA/ADFS] p1 [ADFS] p1 [ 479.167225] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:24 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x60060000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r3 = syz_open_pts(r0, 0x0) dup2(r2, r3) [ 479.328921] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0xfffffdfc}) [ 479.378746] loop7: p1 size 117440512 extends beyond EOD, truncated [ 479.438203] ntfs: (device loop6): parse_options(): Unrecognized mount option . 15:02:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000001000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 479.497018] hfs: can't find a HFS filesystem on dev loop3 15:02:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x300000000000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0xd, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:25 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) 15:02:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r3 = syz_open_pts(r0, 0x0) dup2(r2, r3) 15:02:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)="68667302", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x4}) [ 479.798819] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00f5ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 479.829268] ntfs: (device loop6): parse_options(): Unrecognized mount option . [ 479.857304] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0xf0ffffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 480.013495] loop7: [CUMANA/ADFS] p1 [ADFS] p1 15:02:25 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 15:02:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], 0x300}) 15:02:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)) 15:02:25 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid'}}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) [ 480.108426] loop7: p1 size 117440512 extends beyond EOD, truncated 15:02:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a006c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f00003c7ff4)={0x10, 0x0, 0x9effffff00000000}, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x330}}, 0x0) 15:02:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0x9300000000000000, 0x1, &(0x7f0000000540)=[{&(0x7f0000000180)="a30e16fc06ad6b33bc107db6eeb34e82c683dfab0837ff505f650e7e42", 0x1d, 0xde3}]) 15:02:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 15:02:25 executing program 6: syz_mount_image$ntfs(&(0x7f0000001380)='ntfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmask={'dmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask'}}]}) [ 480.335106] hfs: can't find a HFS filesystem on dev loop3 [ 636.257036] INFO: task udevd:4711 blocked for more than 140 seconds. [ 636.263680] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 636.269457] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 636.277468] udevd D22488 4711 2538 0x00000000 [ 636.283165] Call Trace: [ 636.285800] __schedule+0x87c/0x1df0 [ 636.289568] ? __sched_text_start+0x8/0x8 [ 636.293744] ? mark_held_locks+0x160/0x160 [ 636.298021] ? graph_lock+0x170/0x170 [ 636.301913] ? print_usage_bug+0xc0/0xc0 [ 636.306003] ? find_held_lock+0x36/0x1c0 [ 636.310189] schedule+0xfb/0x450 [ 636.313607] ? __schedule+0x1df0/0x1df0 [ 636.317625] ? lockdep_hardirqs_on+0x421/0x5c0 [ 636.322248] ? trace_hardirqs_on+0xbd/0x2c0 [ 636.326620] ? kasan_check_read+0x11/0x20 [ 636.330813] ? rwsem_down_read_failed+0x338/0x610 [ 636.335700] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 636.340855] ? kasan_check_write+0x14/0x20 [ 636.345212] ? do_raw_spin_lock+0xc1/0x200 [ 636.349504] rwsem_down_read_failed+0x362/0x610 [ 636.354217] ? rt_mutex_futex_unlock+0x130/0x130 [ 636.359028] ? lock_downgrade+0x8f0/0x8f0 [ 636.363216] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 636.368009] call_rwsem_down_read_failed+0x18/0x30 [ 636.373020] __percpu_down_read+0x16e/0x210 [ 636.377395] ? percpu_free_rwsem+0xa0/0xa0 [ 636.381681] uprobe_start_dup_mmap+0x99/0xa0 [ 636.386148] copy_process+0x2b3d/0x7af0 [ 636.390150] ? mark_held_locks+0x160/0x160 [ 636.394422] ? perf_trace_lock+0xde/0x920 [ 636.398622] ? __cleanup_sighand+0x70/0x70 [ 636.402907] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 636.407775] ? zap_class+0x740/0x740 [ 636.411545] ? perf_trace_lock+0x920/0x920 [ 636.415814] ? graph_lock+0x170/0x170 [ 636.419673] ? find_held_lock+0x36/0x1c0 [ 636.423762] ? lock_downgrade+0x8f0/0x8f0 [ 636.427948] ? print_usage_bug+0xc0/0xc0 [ 636.432031] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 636.436734] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 636.441451] ? is_bpf_text_address+0xd7/0x170 [ 636.446005] ? print_usage_bug+0xc0/0xc0 [ 636.450110] ? __lock_acquire+0x7fc/0x5020 [ 636.454417] ? __save_stack_trace+0x8d/0xf0 [ 636.458835] ? __lock_acquire+0x7fc/0x5020 [ 636.463113] ? save_stack+0x43/0xd0 [ 636.466792] ? kasan_kmalloc+0xc4/0xe0 [ 636.470719] ? print_usage_bug+0xc0/0xc0 [ 636.474827] ? __alloc_file+0xfc/0x400 [ 636.478741] ? alloc_empty_file+0x72/0x170 [ 636.483086] ? alloc_file+0x5e/0x4d0 [ 636.486831] ? alloc_file_clone+0x25/0xd0 [ 636.491020] ? create_pipe_files+0x471/0x720 [ 636.495454] ? __do_pipe_flags+0x45/0x250 [ 636.499644] ? mark_held_locks+0x160/0x160 [ 636.503900] ? find_held_lock+0x36/0x1c0 [ 636.507999] ? perf_trace_lock+0xde/0x920 [ 636.512236] ? __lock_acquire+0x7fc/0x5020 [ 636.516558] ? zap_class+0x740/0x740 [ 636.520319] ? perf_trace_lock+0x920/0x920 [ 636.524660] ? perf_trace_lock+0xde/0x920 [ 636.528870] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 636.533800] ? zap_class+0x740/0x740 [ 636.537554] ? perf_trace_lock+0x920/0x920 [ 636.541836] ? expand_files.part.8+0x571/0x9c0 [ 636.546470] ? graph_lock+0x170/0x170 [ 636.550296] ? find_held_lock+0x36/0x1c0 [ 636.554402] ? perf_trace_lock+0xde/0x920 [ 636.558574] ? find_held_lock+0x36/0x1c0 [ 636.562680] ? lock_downgrade+0x8f0/0x8f0 [ 636.566902] ? rcu_is_watching+0x8c/0x150 [ 636.571073] ? __lock_is_held+0xb5/0x140 [ 636.575170] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 636.579898] _do_fork+0x1ca/0x1170 [ 636.583478] ? fork_idle+0x240/0x240 [ 636.587212] ? lock_release+0x9f0/0x9f0 [ 636.591529] ? fd_install+0x4d/0x60 [ 636.595247] ? do_syscall_64+0x9a/0x820 [ 636.599330] ? do_syscall_64+0x9a/0x820 [ 636.603339] ? lockdep_hardirqs_on+0x421/0x5c0 [ 636.607959] ? trace_hardirqs_on+0xbd/0x2c0 [ 636.612309] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.617737] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 636.622970] __x64_sys_clone+0xbf/0x150 [ 636.627004] do_syscall_64+0x1b9/0x820 [ 636.630926] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 636.636336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 636.641288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.646196] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 636.651390] ? prepare_exit_to_usermode+0x291/0x3b0 [ 636.656462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.661337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.666581] RIP: 0033:0x7f78fd4a8f46 [ 636.670336] Code: Bad RIP value. [ 636.673743] RSP: 002b:00007ffcefe84b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 636.681475] RAX: ffffffffffffffda RBX: 00007ffcefe84b40 RCX: 00007f78fd4a8f46 [ 636.688800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 636.696112] RBP: 00007ffcefe84ba0 R08: 0000000000001267 R09: 0000000000001267 [ 636.703436] R10: 00007f78fddc5a70 R11: 0000000000000246 R12: 0000000000000000 [ 636.710750] R13: 00007ffcefe84b60 R14: 0000000000000005 R15: 0000000000000005 [ 636.718102] INFO: task udevd:4712 blocked for more than 140 seconds. [ 636.724732] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 636.730495] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 636.738533] udevd D22488 4712 2538 0x00000000 [ 636.744213] Call Trace: [ 636.746837] __schedule+0x87c/0x1df0 [ 636.750663] ? __sched_text_start+0x8/0x8 [ 636.754862] ? mark_held_locks+0x160/0x160 [ 636.759184] ? graph_lock+0x170/0x170 [ 636.763032] ? print_usage_bug+0xc0/0xc0 [ 636.767116] ? find_held_lock+0x36/0x1c0 [ 636.771297] schedule+0xfb/0x450 [ 636.774722] ? __schedule+0x1df0/0x1df0 [ 636.778742] ? lockdep_hardirqs_on+0x421/0x5c0 [ 636.783350] ? trace_hardirqs_on+0xbd/0x2c0 [ 636.787727] ? kasan_check_read+0x11/0x20 [ 636.791921] ? rwsem_down_read_failed+0x338/0x610 [ 636.796812] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 636.801966] ? kasan_check_write+0x14/0x20 [ 636.806244] ? do_raw_spin_lock+0xc1/0x200 [ 636.810507] rwsem_down_read_failed+0x362/0x610 [ 636.815303] ? rt_mutex_futex_unlock+0x130/0x130 [ 636.820095] ? lock_downgrade+0x8f0/0x8f0 [ 636.824316] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 636.829054] call_rwsem_down_read_failed+0x18/0x30 [ 636.834202] __percpu_down_read+0x16e/0x210 [ 636.838570] ? percpu_free_rwsem+0xa0/0xa0 [ 636.842856] uprobe_start_dup_mmap+0x99/0xa0 [ 636.848854] copy_process+0x2b3d/0x7af0 [ 636.852989] ? mark_held_locks+0x160/0x160 [ 636.857274] ? perf_trace_lock+0xde/0x920 [ 636.861464] ? __cleanup_sighand+0x70/0x70 [ 636.865756] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 636.870630] ? zap_class+0x740/0x740 [ 636.874383] ? perf_trace_lock+0x920/0x920 [ 636.878644] ? graph_lock+0x170/0x170 [ 636.882508] ? find_held_lock+0x36/0x1c0 [ 636.886606] ? lock_downgrade+0x8f0/0x8f0 [ 636.890812] ? print_usage_bug+0xc0/0xc0 [ 636.894956] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 636.899685] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 636.904410] ? is_bpf_text_address+0xd7/0x170 [ 636.908964] ? print_usage_bug+0xc0/0xc0 [ 636.913070] ? __lock_acquire+0x7fc/0x5020 [ 636.917359] ? __save_stack_trace+0x8d/0xf0 [ 636.921750] ? __lock_acquire+0x7fc/0x5020 [ 636.926129] ? save_stack+0x43/0xd0 [ 636.929810] ? kasan_kmalloc+0xc4/0xe0 [ 636.933753] ? print_usage_bug+0xc0/0xc0 [ 636.937893] ? __alloc_file+0xfc/0x400 [ 636.941844] ? alloc_empty_file+0x72/0x170 [ 636.946110] ? alloc_file+0x5e/0x4d0 [ 636.949887] ? alloc_file_clone+0x25/0xd0 [ 636.954058] ? create_pipe_files+0x471/0x720 [ 636.958517] ? __do_pipe_flags+0x45/0x250 [ 636.962713] ? mark_held_locks+0x160/0x160 [ 636.966995] ? find_held_lock+0x36/0x1c0 [ 636.971100] ? perf_trace_lock+0xde/0x920 [ 636.975376] ? __lock_acquire+0x7fc/0x5020 [ 636.979643] ? zap_class+0x740/0x740 [ 636.983396] ? perf_trace_lock+0x920/0x920 [ 636.987659] ? perf_trace_lock+0xde/0x920 [ 636.991893] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 636.996789] ? zap_class+0x740/0x740 [ 637.000566] ? perf_trace_lock+0x920/0x920 [ 637.004842] ? expand_files.part.8+0x571/0x9c0 [ 637.009479] ? graph_lock+0x170/0x170 [ 637.013300] ? find_held_lock+0x36/0x1c0 [ 637.017402] ? perf_trace_lock+0xde/0x920 [ 637.021639] ? find_held_lock+0x36/0x1c0 [ 637.025758] ? lock_downgrade+0x8f0/0x8f0 [ 637.029951] ? rcu_is_watching+0x8c/0x150 [ 637.034274] ? __lock_is_held+0xb5/0x140 [ 637.038370] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 637.043104] _do_fork+0x1ca/0x1170 [ 637.046677] ? fork_idle+0x240/0x240 [ 637.050427] ? lock_release+0x9f0/0x9f0 [ 637.054501] ? fd_install+0x4d/0x60 [ 637.058185] ? do_syscall_64+0x9a/0x820 [ 637.062187] ? do_syscall_64+0x9a/0x820 [ 637.066200] ? lockdep_hardirqs_on+0x421/0x5c0 [ 637.070806] ? trace_hardirqs_on+0xbd/0x2c0 [ 637.075166] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.080556] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 637.085778] __x64_sys_clone+0xbf/0x150 [ 637.089805] do_syscall_64+0x1b9/0x820 [ 637.093753] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 637.099208] ? syscall_return_slowpath+0x5e0/0x5e0 [ 637.104195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.109069] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 637.114129] ? prepare_exit_to_usermode+0x291/0x3b0 [ 637.119356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.124257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.129474] RIP: 0033:0x7f78fd4a8f46 [ 637.133343] Code: Bad RIP value. [ 637.136736] RSP: 002b:00007ffcefe84b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 637.144492] RAX: ffffffffffffffda RBX: 00007ffcefe84b40 RCX: 00007f78fd4a8f46 [ 637.151908] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 637.159331] RBP: 00007ffcefe84ba0 R08: 0000000000001268 R09: 0000000000001268 [ 637.166728] R10: 00007f78fddc5a70 R11: 0000000000000246 R12: 0000000000000000 [ 637.174059] R13: 00007ffcefe84b60 R14: 0000000000000005 R15: 0000000000000005 [ 637.181396] INFO: task syz-executor0:4752 blocked for more than 140 seconds. [ 637.188624] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 637.194368] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 637.202363] syz-executor0 D21560 4752 1 0x00000004 [ 637.208034] Call Trace: [ 637.210657] __schedule+0x87c/0x1df0 [ 637.214412] ? __sched_text_start+0x8/0x8 [ 637.218703] ? graph_lock+0x170/0x170 [ 637.222556] ? print_usage_bug+0xc0/0xc0 [ 637.226649] ? find_held_lock+0x36/0x1c0 [ 637.230823] schedule+0xfb/0x450 [ 637.234235] ? __schedule+0x1df0/0x1df0 [ 637.238251] ? lockdep_hardirqs_on+0x421/0x5c0 [ 637.242894] ? trace_hardirqs_on+0xbd/0x2c0 [ 637.247247] ? kasan_check_read+0x11/0x20 [ 637.251422] ? rwsem_down_read_failed+0x338/0x610 [ 637.256299] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 637.261432] ? kasan_check_write+0x14/0x20 [ 637.265726] ? do_raw_spin_lock+0xc1/0x200 [ 637.269996] rwsem_down_read_failed+0x362/0x610 [ 637.274758] ? rt_mutex_futex_unlock+0x130/0x130 [ 637.279553] ? lock_downgrade+0x8f0/0x8f0 [ 637.283747] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 637.288447] call_rwsem_down_read_failed+0x18/0x30 [ 637.293431] __percpu_down_read+0x16e/0x210 [ 637.297793] ? percpu_free_rwsem+0xa0/0xa0 [ 637.302088] uprobe_start_dup_mmap+0x99/0xa0 [ 637.306637] copy_process+0x2b3d/0x7af0 [ 637.310668] ? trace_hardirqs_off+0xb8/0x2b0 [ 637.315109] ? kasan_check_read+0x11/0x20 [ 637.319299] ? do_raw_spin_unlock+0xa7/0x2f0 [ 637.323730] ? trace_hardirqs_on+0x2c0/0x2c0 [ 637.328173] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 637.332801] ? __cleanup_sighand+0x70/0x70 [ 637.337074] ? migrate_swap_stop+0x850/0x850 [ 637.341576] ? perf_trace_lock+0x920/0x920 [ 637.345883] ? print_usage_bug+0xc0/0xc0 [ 637.349976] ? graph_lock+0x170/0x170 [ 637.353845] ? find_held_lock+0x36/0x1c0 [ 637.357953] ? __lock_acquire+0x7fc/0x5020 [ 637.362227] ? print_usage_bug+0xc0/0xc0 [ 637.366324] ? mark_held_locks+0x160/0x160 [ 637.370602] ? lock_downgrade+0x8f0/0x8f0 [ 637.374803] ? mark_held_locks+0x160/0x160 [ 637.379088] ? trace_hardirqs_on+0x2c0/0x2c0 [ 637.383536] ? __lock_acquire+0x7fc/0x5020 [ 637.387808] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 637.393045] ? graph_lock+0x170/0x170 [ 637.396907] ? mark_held_locks+0x160/0x160 [ 637.401162] ? graph_lock+0x170/0x170 [ 637.404998] ? zap_class+0x740/0x740 [ 637.408748] ? __lock_is_held+0xb5/0x140 [ 637.412887] ? perf_trace_lock+0xde/0x920 [ 637.417074] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 637.422142] ? __mark_inode_dirty+0x494/0x1300 [ 637.426748] ? zap_class+0x740/0x740 [ 637.430504] ? mark_held_locks+0xc9/0x160 [ 637.434680] ? graph_lock+0x170/0x170 [ 637.438519] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 637.443724] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 637.448952] ? lockdep_hardirqs_on+0x421/0x5c0 [ 637.453568] ? trace_hardirqs_on+0xbd/0x2c0 [ 637.457927] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 637.463148] ? current_time+0x72/0x1b0 [ 637.467091] ? find_held_lock+0x36/0x1c0 [ 637.471197] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 637.476428] ? lock_downgrade+0x8f0/0x8f0 [ 637.480610] ? __sb_end_write+0xac/0xe0 [ 637.484619] ? touch_atime+0x103/0x320 [ 637.488524] ? file_remove_privs+0x530/0x530 [ 637.492974] ? file_remove_privs+0x530/0x530 [ 637.497410] ? atime_needs_update+0x710/0x710 [ 637.501947] ? pipe_read+0x702/0x940 [ 637.505688] _do_fork+0x1ca/0x1170 [ 637.509260] ? fork_idle+0x240/0x240 [ 637.513008] ? fsnotify_first_mark+0x350/0x350 [ 637.517634] ? __fsnotify_parent+0xcc/0x420 [ 637.521987] ? fsnotify+0xf20/0xf20 [ 637.525658] ? rw_verify_area+0x118/0x360 [ 637.529887] ? vfs_read+0x1ce/0x3c0 [ 637.533562] ? do_syscall_64+0x9a/0x820 [ 637.537568] ? do_syscall_64+0x9a/0x820 [ 637.541573] ? lockdep_hardirqs_on+0x421/0x5c0 [ 637.546225] ? trace_hardirqs_on+0xbd/0x2c0 [ 637.550592] ? kernel_write+0x120/0x120 [ 637.554702] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.560107] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 637.565234] __x64_sys_clone+0xbf/0x150 [ 637.569309] do_syscall_64+0x1b9/0x820 [ 637.573228] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 637.578627] ? syscall_return_slowpath+0x5e0/0x5e0 [ 637.583573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.588543] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 637.593579] ? prepare_exit_to_usermode+0x291/0x3b0 [ 637.598716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.603601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.608831] RIP: 0033:0x45574a [ 637.612055] Code: Bad RIP value. [ 637.615448] RSP: 002b:00007ffdcdf7a290 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 637.623233] RAX: ffffffffffffffda RBX: 00007ffdcdf7a290 RCX: 000000000045574a [ 637.630549] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 637.638032] RBP: 00007ffdcdf7a2d0 R08: 0000000000000001 R09: 00000000011d9940 [ 637.645354] R10: 00000000011d9c10 R11: 0000000000000246 R12: 0000000000000001 [ 637.652656] R13: 0000000000000000 R14: 0000000000000000 R15: badc0ffeebadface [ 637.660035] INFO: task syz-executor1:4754 blocked for more than 140 seconds. [ 637.667277] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 637.673027] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 637.681005] syz-executor1 D21032 4754 1 0x00000004 [ 637.686685] Call Trace: [ 637.689309] __schedule+0x87c/0x1df0 [ 637.693066] ? __sched_text_start+0x8/0x8 [ 637.697239] ? graph_lock+0x170/0x170 [ 637.701085] ? print_usage_bug+0xc0/0xc0 [ 637.705175] ? find_held_lock+0x36/0x1c0 [ 637.709370] schedule+0xfb/0x450 [ 637.712773] ? __schedule+0x1df0/0x1df0 [ 637.716839] ? lockdep_hardirqs_on+0x421/0x5c0 [ 637.721461] ? trace_hardirqs_on+0xbd/0x2c0 [ 637.725829] ? kasan_check_read+0x11/0x20 [ 637.730014] ? rwsem_down_read_failed+0x338/0x610 [ 637.734914] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 637.740118] ? kasan_check_write+0x14/0x20 [ 637.744400] ? do_raw_spin_lock+0xc1/0x200 [ 637.748685] rwsem_down_read_failed+0x362/0x610 [ 637.753396] ? rt_mutex_futex_unlock+0x130/0x130 [ 637.758459] ? lock_downgrade+0x8f0/0x8f0 [ 637.762658] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 637.767363] call_rwsem_down_read_failed+0x18/0x30 [ 637.772331] __percpu_down_read+0x16e/0x210 [ 637.776670] ? percpu_free_rwsem+0xa0/0xa0 [ 637.780947] uprobe_start_dup_mmap+0x99/0xa0 [ 637.785399] copy_process+0x2b3d/0x7af0 [ 637.789415] ? attach_entity_load_avg+0x860/0x860 [ 637.794337] ? update_load_avg+0x389/0x27d0 [ 637.798720] ? __cleanup_sighand+0x70/0x70 [ 637.802983] ? zap_class+0x740/0x740 [ 637.806730] ? rb_erase+0x3550/0x3550 [ 637.810549] ? perf_trace_lock+0x920/0x920 [ 637.814951] ? print_usage_bug+0xc0/0xc0 [ 637.819045] ? graph_lock+0x170/0x170 [ 637.822900] ? graph_lock+0x170/0x170 [ 637.826721] ? print_usage_bug+0xc0/0xc0 [ 637.830813] ? find_held_lock+0x36/0x1c0 [ 637.834899] ? graph_lock+0x170/0x170 [ 637.838755] ? __lock_acquire+0x7fc/0x5020 [ 637.843019] ? graph_lock+0x170/0x170 [ 637.846877] ? __lock_is_held+0xb5/0x140 [ 637.850956] ? mark_held_locks+0x160/0x160 [ 637.855220] ? __lock_is_held+0xb5/0x140 [ 637.859299] ? __account_cfs_rq_runtime+0x770/0x770 [ 637.864376] ? perf_trace_lock+0xde/0x920 [ 637.868542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.874111] ? zap_class+0x740/0x740 [ 637.877888] ? graph_lock+0x170/0x170 [ 637.881707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.887358] ? __perf_event_task_sched_in+0x24f/0xbb0 [ 637.892587] ? perf_trace_lock+0xde/0x920 [ 637.896777] ? find_held_lock+0x36/0x1c0 [ 637.900902] ? _raw_spin_unlock_irq+0x27/0x70 [ 637.905449] ? _raw_spin_unlock_irq+0x27/0x70 [ 637.909977] ? lockdep_hardirqs_on+0x421/0x5c0 [ 637.914594] ? trace_hardirqs_on+0xbd/0x2c0 [ 637.918947] ? kasan_check_read+0x11/0x20 [ 637.923135] ? finish_task_switch+0x1d3/0x870 [ 637.927645] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 637.932799] ? compat_start_thread+0x80/0x80 [ 637.937262] ? _raw_spin_unlock_irq+0x27/0x70 [ 637.941856] ? finish_task_switch+0x1d3/0x870 [ 637.946398] ? finish_task_switch+0x18a/0x870 [ 637.950942] ? __switch_to_asm+0x34/0x70 [ 637.955029] ? preempt_notifier_register+0x200/0x200 [ 637.960207] ? __switch_to_asm+0x34/0x70 [ 637.964306] ? __switch_to_asm+0x34/0x70 [ 637.968487] ? __switch_to_asm+0x40/0x70 [ 637.972576] ? __switch_to_asm+0x34/0x70 [ 637.976683] ? __switch_to_asm+0x40/0x70 [ 637.980760] ? __switch_to_asm+0x34/0x70 [ 637.984858] ? __switch_to_asm+0x40/0x70 [ 637.988964] ? __switch_to_asm+0x34/0x70 [ 637.993062] ? __switch_to_asm+0x34/0x70 [ 637.997137] ? __switch_to_asm+0x40/0x70 [ 638.001227] ? __switch_to_asm+0x34/0x70 [ 638.005303] ? __switch_to_asm+0x40/0x70 [ 638.009395] ? __switch_to_asm+0x34/0x70 [ 638.013489] ? __switch_to_asm+0x40/0x70 [ 638.017604] ? __schedule+0x884/0x1df0 [ 638.021513] ? __sched_text_start+0x8/0x8 [ 638.025706] _do_fork+0x1ca/0x1170 [ 638.029282] ? fork_idle+0x240/0x240 [ 638.033040] ? schedule+0xfb/0x450 [ 638.036618] ? fsnotify+0xf20/0xf20 [ 638.040287] ? __schedule+0x1df0/0x1df0 [ 638.044284] ? exit_to_usermode_loop+0x8c/0x380 [ 638.048992] ? exit_to_usermode_loop+0x8c/0x380 [ 638.053947] ? trace_hardirqs_off+0xb8/0x2b0 [ 638.058387] ? do_syscall_64+0x6be/0x820 [ 638.062516] ? trace_hardirqs_on+0x2c0/0x2c0 [ 638.067059] ? do_syscall_64+0x9a/0x820 [ 638.071067] ? do_syscall_64+0x9a/0x820 [ 638.075086] ? lockdep_hardirqs_on+0x421/0x5c0 [ 638.079702] ? trace_hardirqs_on+0xbd/0x2c0 [ 638.084082] ? exit_to_usermode_loop+0x1f4/0x380 [ 638.088879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.094293] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 638.099430] __x64_sys_clone+0xbf/0x150 [ 638.103462] do_syscall_64+0x1b9/0x820 [ 638.107428] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 638.112855] ? syscall_return_slowpath+0x5e0/0x5e0 [ 638.117826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.122705] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 638.127740] ? prepare_exit_to_usermode+0x291/0x3b0 [ 638.132791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.137660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.142913] RIP: 0033:0x45574a [ 638.146178] Code: Bad RIP value. [ 638.149630] RSP: 002b:00007fff590938d0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 638.157365] RAX: ffffffffffffffda RBX: 00007fff590938d0 RCX: 000000000045574a [ 638.164683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 638.171974] RBP: 00007fff59093910 R08: 0000000000000001 R09: 0000000001d2a940 [ 638.179277] R10: 0000000001d2ac10 R11: 0000000000000246 R12: 0000000000000001 [ 638.186578] R13: 0000000000000000 R14: 0000000000000000 R15: badc0ffeebadface [ 638.193973] INFO: task syz-executor6:4756 blocked for more than 140 seconds. [ 638.201213] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 638.206949] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 638.215067] syz-executor6 D21184 4756 1 0x00000004 [ 638.220732] Call Trace: [ 638.223370] __schedule+0x87c/0x1df0 [ 638.227111] ? __sched_text_start+0x8/0x8 [ 638.231296] ? graph_lock+0x170/0x170 [ 638.235120] ? print_usage_bug+0xc0/0xc0 [ 638.239218] ? find_held_lock+0x36/0x1c0 [ 638.243314] schedule+0xfb/0x450 [ 638.246712] ? __schedule+0x1df0/0x1df0 [ 638.250703] ? lockdep_hardirqs_on+0x421/0x5c0 [ 638.255336] ? trace_hardirqs_on+0xbd/0x2c0 [ 638.259697] ? kasan_check_read+0x11/0x20 [ 638.263901] ? rwsem_down_read_failed+0x338/0x610 [ 638.268788] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 638.273935] ? kasan_check_write+0x14/0x20 [ 638.278190] ? do_raw_spin_lock+0xc1/0x200 [ 638.282465] rwsem_down_read_failed+0x362/0x610 [ 638.287156] ? rt_mutex_futex_unlock+0x130/0x130 [ 638.291945] ? lock_downgrade+0x8f0/0x8f0 [ 638.296115] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 638.300826] call_rwsem_down_read_failed+0x18/0x30 [ 638.305785] __percpu_down_read+0x16e/0x210 [ 638.310209] ? percpu_free_rwsem+0xa0/0xa0 [ 638.314583] uprobe_start_dup_mmap+0x99/0xa0 [ 638.319046] copy_process+0x2b3d/0x7af0 [ 638.323051] ? trace_hardirqs_off+0xb8/0x2b0 [ 638.327491] ? kasan_check_read+0x11/0x20 [ 638.331661] ? do_raw_spin_unlock+0xa7/0x2f0 [ 638.336154] ? trace_hardirqs_on+0x2c0/0x2c0 [ 638.340592] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 638.345224] ? __cleanup_sighand+0x70/0x70 [ 638.349484] ? migrate_swap_stop+0x850/0x850 [ 638.353959] ? perf_trace_lock+0x920/0x920 [ 638.358219] ? print_usage_bug+0xc0/0xc0 [ 638.362312] ? graph_lock+0x170/0x170 [ 638.366139] ? find_held_lock+0x36/0x1c0 [ 638.370250] ? __lock_acquire+0x7fc/0x5020 [ 638.374511] ? print_usage_bug+0xc0/0xc0 [ 638.378602] ? mark_held_locks+0x160/0x160 [ 638.382885] ? lock_downgrade+0x8f0/0x8f0 [ 638.387078] ? mark_held_locks+0x160/0x160 [ 638.391348] ? trace_hardirqs_on+0x2c0/0x2c0 [ 638.395805] ? __lock_acquire+0x7fc/0x5020 [ 638.400088] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 638.405242] ? graph_lock+0x170/0x170 [ 638.409070] ? mark_held_locks+0x160/0x160 [ 638.413336] ? graph_lock+0x170/0x170 [ 638.417158] ? zap_class+0x740/0x740 [ 638.420905] ? __lock_is_held+0xb5/0x140 [ 638.424992] ? perf_trace_lock+0xde/0x920 [ 638.429172] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 638.434220] ? __mark_inode_dirty+0x494/0x1300 [ 638.438846] ? zap_class+0x740/0x740 [ 638.442591] ? mark_held_locks+0xc9/0x160 [ 638.446772] ? graph_lock+0x170/0x170 [ 638.450591] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 638.455809] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 638.461015] ? lockdep_hardirqs_on+0x421/0x5c0 [ 638.465627] ? trace_hardirqs_on+0xbd/0x2c0 [ 638.469967] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 638.475260] ? current_time+0x72/0x1b0 [ 638.479297] ? find_held_lock+0x36/0x1c0 [ 638.483472] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 638.488696] ? lock_downgrade+0x8f0/0x8f0 [ 638.492905] ? __sb_end_write+0xac/0xe0 [ 638.496896] ? touch_atime+0x103/0x320 [ 638.500904] ? file_remove_privs+0x530/0x530 [ 638.505340] ? file_remove_privs+0x530/0x530 [ 638.509784] ? atime_needs_update+0x710/0x710 [ 638.514310] ? pipe_read+0x702/0x940 [ 638.518068] _do_fork+0x1ca/0x1170 [ 638.521641] ? fork_idle+0x240/0x240 [ 638.525444] ? fsnotify_first_mark+0x350/0x350 [ 638.530056] ? __fsnotify_parent+0xcc/0x420 [ 638.534411] ? fsnotify+0xf20/0xf20 [ 638.538067] ? rw_verify_area+0x118/0x360 [ 638.542289] ? vfs_read+0x1ce/0x3c0 [ 638.546012] ? do_syscall_64+0x9a/0x820 [ 638.550033] ? do_syscall_64+0x9a/0x820 [ 638.554050] ? lockdep_hardirqs_on+0x421/0x5c0 [ 638.558694] ? trace_hardirqs_on+0xbd/0x2c0 [ 638.563074] ? kernel_write+0x120/0x120 [ 638.567096] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.572528] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 638.577716] __x64_sys_clone+0xbf/0x150 [ 638.581758] do_syscall_64+0x1b9/0x820 [ 638.585693] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 638.591112] ? syscall_return_slowpath+0x5e0/0x5e0 [ 638.596112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.600999] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 638.606070] ? prepare_exit_to_usermode+0x291/0x3b0 [ 638.611160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.616066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.621296] RIP: 0033:0x45574a [ 638.624530] Code: Bad RIP value. [ 638.627939] RSP: 002b:00007ffce5b71030 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 638.635711] RAX: ffffffffffffffda RBX: 00007ffce5b71030 RCX: 000000000045574a [ 638.643033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 638.650343] RBP: 00007ffce5b71070 R08: 0000000000000001 R09: 0000000002588940 [ 638.657644] R10: 0000000002588c10 R11: 0000000000000246 R12: 0000000000000001 [ 638.664956] R13: 0000000000000000 R14: 0000000000000000 R15: badc0ffeebadface [ 638.672279] INFO: task syz-executor7:4758 blocked for more than 140 seconds. [ 638.679505] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 638.685244] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 638.693248] syz-executor7 D21184 4758 1 0x00000004 [ 638.698937] Call Trace: [ 638.701572] __schedule+0x87c/0x1df0 [ 638.705367] ? __sched_text_start+0x8/0x8 [ 638.709565] ? graph_lock+0x170/0x170 [ 638.713410] ? print_usage_bug+0xc0/0xc0 [ 638.717515] ? find_held_lock+0x36/0x1c0 [ 638.721636] schedule+0xfb/0x450 [ 638.725050] ? __schedule+0x1df0/0x1df0 [ 638.729070] ? lockdep_hardirqs_on+0x421/0x5c0 [ 638.733753] ? trace_hardirqs_on+0xbd/0x2c0 [ 638.738116] ? kasan_check_read+0x11/0x20 [ 638.742314] ? rwsem_down_read_failed+0x338/0x610 [ 638.747198] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 638.752352] ? kasan_check_write+0x14/0x20 [ 638.756660] ? do_raw_spin_lock+0xc1/0x200 [ 638.760936] rwsem_down_read_failed+0x362/0x610 [ 638.765655] ? rt_mutex_futex_unlock+0x130/0x130 [ 638.770452] ? lock_downgrade+0x8f0/0x8f0 [ 638.774759] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 638.779481] call_rwsem_down_read_failed+0x18/0x30 [ 638.784465] __percpu_down_read+0x16e/0x210 [ 638.788825] ? percpu_free_rwsem+0xa0/0xa0 [ 638.793131] uprobe_start_dup_mmap+0x99/0xa0 [ 638.797585] copy_process+0x2b3d/0x7af0 [ 638.801606] ? mark_held_locks+0x160/0x160 [ 638.805908] ? finish_mkwrite_fault+0x540/0x540 [ 638.810664] ? __cleanup_sighand+0x70/0x70 [ 638.814947] ? perf_trace_lock+0x920/0x920 [ 638.819259] ? print_usage_bug+0xc0/0xc0 [ 638.823442] ? graph_lock+0x170/0x170 [ 638.827314] ? find_held_lock+0x36/0x1c0 [ 638.831419] ? __lock_acquire+0x7fc/0x5020 [ 638.835696] ? print_usage_bug+0xc0/0xc0 [ 638.839823] ? mark_held_locks+0x160/0x160 [ 638.844119] ? lock_downgrade+0x8f0/0x8f0 [ 638.848349] ? lock_downgrade+0x8f0/0x8f0 [ 638.852530] ? mark_held_locks+0x160/0x160 [ 638.856807] ? trace_hardirqs_on+0x2c0/0x2c0 [ 638.861257] ? __lock_acquire+0x7fc/0x5020 [ 638.865550] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 638.870700] ? graph_lock+0x170/0x170 [ 638.874552] ? mark_held_locks+0x160/0x160 [ 638.878825] ? graph_lock+0x170/0x170 [ 638.882684] ? zap_class+0x740/0x740 [ 638.886448] ? __lock_is_held+0xb5/0x140 [ 638.890568] ? perf_trace_lock+0xde/0x920 [ 638.894763] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 638.899823] ? __mark_inode_dirty+0x494/0x1300 [ 638.904473] ? zap_class+0x740/0x740 [ 638.908254] ? mark_held_locks+0xc9/0x160 [ 638.912442] ? graph_lock+0x170/0x170 [ 638.916298] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 638.921532] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 638.926773] ? lockdep_hardirqs_on+0x421/0x5c0 [ 638.931400] ? trace_hardirqs_on+0xbd/0x2c0 [ 638.935795] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 638.941025] ? current_time+0x72/0x1b0 [ 638.944967] ? find_held_lock+0x36/0x1c0 [ 638.949100] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 638.954347] ? lock_downgrade+0x8f0/0x8f0 [ 638.958551] ? __sb_end_write+0xac/0xe0 [ 638.962575] ? touch_atime+0x103/0x320 [ 638.966503] ? file_remove_privs+0x530/0x530 [ 638.970961] ? file_remove_privs+0x530/0x530 [ 638.975437] ? atime_needs_update+0x710/0x710 [ 638.979966] ? pipe_read+0x702/0x940 [ 638.983761] _do_fork+0x1ca/0x1170 [ 638.987345] ? fork_idle+0x240/0x240 [ 638.991109] ? fsnotify_first_mark+0x350/0x350 [ 638.995746] ? __fsnotify_parent+0xcc/0x420 [ 639.000114] ? fsnotify+0xf20/0xf20 [ 639.003792] ? rw_verify_area+0x118/0x360 [ 639.007989] ? vfs_read+0x1ce/0x3c0 [ 639.011661] ? do_syscall_64+0x9a/0x820 [ 639.015677] ? do_syscall_64+0x9a/0x820 [ 639.019687] ? lockdep_hardirqs_on+0x421/0x5c0 [ 639.024313] ? trace_hardirqs_on+0xbd/0x2c0 [ 639.028673] ? kernel_write+0x120/0x120 [ 639.032696] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.038194] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 639.043356] __x64_sys_clone+0xbf/0x150 [ 639.047377] do_syscall_64+0x1b9/0x820 [ 639.051320] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 639.056757] ? syscall_return_slowpath+0x5e0/0x5e0 [ 639.062213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.067107] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 639.072180] ? prepare_exit_to_usermode+0x291/0x3b0 [ 639.077265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.082166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.087419] RIP: 0033:0x45574a [ 639.090644] Code: Bad RIP value. [ 639.094044] RSP: 002b:00007ffc193b1590 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 639.101794] RAX: ffffffffffffffda RBX: 00007ffc193b1590 RCX: 000000000045574a [ 639.109103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 639.116428] RBP: 00007ffc193b15d0 R08: 0000000000000001 R09: 0000000001c79940 [ 639.123734] R10: 0000000001c79c10 R11: 0000000000000246 R12: 0000000000000001 [ 639.131044] R13: 0000000000000000 R14: 0000000000000000 R15: badc0ffeebadface [ 639.138363] INFO: task udevd:6793 blocked for more than 140 seconds. [ 639.144915] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 639.150652] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 639.158656] udevd D22488 6793 2538 0x00000000 [ 639.164353] Call Trace: [ 639.166989] __schedule+0x87c/0x1df0 [ 639.170754] ? __sched_text_start+0x8/0x8 [ 639.174962] ? graph_lock+0x170/0x170 [ 639.178830] ? print_usage_bug+0xc0/0xc0 [ 639.182935] ? find_held_lock+0x36/0x1c0 [ 639.187068] schedule+0xfb/0x450 [ 639.190477] ? __schedule+0x1df0/0x1df0 [ 639.194495] ? lockdep_hardirqs_on+0x421/0x5c0 [ 639.199120] ? trace_hardirqs_on+0xbd/0x2c0 [ 639.203485] ? kasan_check_read+0x11/0x20 [ 639.207668] ? rwsem_down_read_failed+0x338/0x610 [ 639.212555] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 639.217702] ? kasan_check_write+0x14/0x20 [ 639.221988] ? do_raw_spin_lock+0xc1/0x200 [ 639.226329] rwsem_down_read_failed+0x362/0x610 [ 639.231054] ? rt_mutex_futex_unlock+0x130/0x130 [ 639.235907] ? lock_downgrade+0x8f0/0x8f0 [ 639.240098] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.244854] call_rwsem_down_read_failed+0x18/0x30 [ 639.249867] __percpu_down_read+0x16e/0x210 [ 639.254275] ? percpu_free_rwsem+0xa0/0xa0 [ 639.258591] uprobe_start_dup_mmap+0x99/0xa0 [ 639.263050] copy_process+0x2b3d/0x7af0 [ 639.267076] ? mark_held_locks+0x160/0x160 [ 639.271353] ? perf_trace_lock+0xde/0x920 [ 639.275569] ? __cleanup_sighand+0x70/0x70 [ 639.279843] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 639.284783] ? zap_class+0x740/0x740 [ 639.288537] ? perf_trace_lock+0x920/0x920 [ 639.292822] ? graph_lock+0x170/0x170 [ 639.296677] ? find_held_lock+0x36/0x1c0 [ 639.300805] ? lock_downgrade+0x8f0/0x8f0 [ 639.305022] ? print_usage_bug+0xc0/0xc0 [ 639.309146] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.313905] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.318644] ? is_bpf_text_address+0xd7/0x170 [ 639.323180] ? print_usage_bug+0xc0/0xc0 [ 639.327300] ? __lock_acquire+0x7fc/0x5020 [ 639.331582] ? __save_stack_trace+0x8d/0xf0 [ 639.335971] ? __lock_acquire+0x7fc/0x5020 [ 639.340275] ? save_stack+0x43/0xd0 [ 639.343932] ? kasan_kmalloc+0xc4/0xe0 [ 639.347897] ? print_usage_bug+0xc0/0xc0 [ 639.351991] ? __alloc_file+0xfc/0x400 [ 639.355941] ? alloc_empty_file+0x72/0x170 [ 639.360213] ? alloc_file+0x5e/0x4d0 [ 639.363970] ? alloc_file_clone+0x25/0xd0 [ 639.368180] ? create_pipe_files+0x471/0x720 [ 639.372636] ? __do_pipe_flags+0x45/0x250 [ 639.376830] ? mark_held_locks+0x160/0x160 [ 639.381115] ? find_held_lock+0x36/0x1c0 [ 639.385246] ? perf_trace_lock+0xde/0x920 [ 639.389432] ? __lock_acquire+0x7fc/0x5020 [ 639.393715] ? zap_class+0x740/0x740 [ 639.397477] ? perf_trace_lock+0x920/0x920 [ 639.401769] ? perf_trace_lock+0xde/0x920 [ 639.405971] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 639.410898] ? zap_class+0x740/0x740 [ 639.414676] ? perf_trace_lock+0x920/0x920 [ 639.418965] ? expand_files.part.8+0x571/0x9c0 [ 639.423685] ? graph_lock+0x170/0x170 [ 639.427526] ? find_held_lock+0x36/0x1c0 [ 639.431626] ? perf_trace_lock+0xde/0x920 [ 639.435847] ? find_held_lock+0x36/0x1c0 [ 639.439990] ? lock_downgrade+0x8f0/0x8f0 [ 639.444189] ? rcu_is_watching+0x8c/0x150 [ 639.448374] ? __lock_is_held+0xb5/0x140 [ 639.452477] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.457191] _do_fork+0x1ca/0x1170 [ 639.460790] ? fork_idle+0x240/0x240 [ 639.464542] ? lock_release+0x9f0/0x9f0 [ 639.468588] ? fd_install+0x4d/0x60 [ 639.472257] ? do_syscall_64+0x9a/0x820 [ 639.476277] ? do_syscall_64+0x9a/0x820 [ 639.480295] ? lockdep_hardirqs_on+0x421/0x5c0 [ 639.484929] ? trace_hardirqs_on+0xbd/0x2c0 [ 639.489290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.494723] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 639.499925] __x64_sys_clone+0xbf/0x150 [ 639.503972] do_syscall_64+0x1b9/0x820 [ 639.507921] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 639.513347] ? syscall_return_slowpath+0x5e0/0x5e0 [ 639.518318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.523208] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 639.528284] ? prepare_exit_to_usermode+0x291/0x3b0 [ 639.533351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.538243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.543476] RIP: 0033:0x7f78fd4a8f46 [ 639.547224] Code: Bad RIP value. [ 639.550630] RSP: 002b:00007ffcefe84b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 639.558394] RAX: ffffffffffffffda RBX: 00007ffcefe84b40 RCX: 00007f78fd4a8f46 [ 639.565708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 639.573013] RBP: 00007ffcefe84ba0 R08: 0000000000001a89 R09: 0000000000001a89 [ 639.580322] R10: 00007f78fddc5a70 R11: 0000000000000246 R12: 0000000000000000 [ 639.587628] R13: 00007ffcefe84b60 R14: 0000000000000005 R15: 0000000000000005 [ 639.594978] INFO: task udevd:6805 blocked for more than 140 seconds. [ 639.601530] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 639.607286] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 639.615305] udevd D22488 6805 2538 0x00000000 [ 639.620994] Call Trace: [ 639.623649] __schedule+0x87c/0x1df0 [ 639.627484] ? __sched_text_start+0x8/0x8 [ 639.631708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 639.636508] ? lockdep_hardirqs_on+0x421/0x5c0 [ 639.641135] ? graph_lock+0x170/0x170 [ 639.645003] ? print_usage_bug+0xc0/0xc0 [ 639.649094] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 639.654617] schedule+0xfb/0x450 [ 639.658026] ? __schedule+0x1df0/0x1df0 [ 639.662073] ? lockdep_hardirqs_on+0x421/0x5c0 [ 639.666695] ? trace_hardirqs_on+0xbd/0x2c0 [ 639.671062] ? kasan_check_read+0x11/0x20 [ 639.675278] ? rwsem_down_read_failed+0x338/0x610 [ 639.680167] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 639.685336] ? kasan_check_write+0x14/0x20 [ 639.689598] ? do_raw_spin_lock+0xc1/0x200 [ 639.693910] rwsem_down_read_failed+0x362/0x610 [ 639.698617] ? rt_mutex_futex_unlock+0x130/0x130 [ 639.703509] ? lock_downgrade+0x8f0/0x8f0 [ 639.707739] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.712483] call_rwsem_down_read_failed+0x18/0x30 [ 639.717480] __percpu_down_read+0x16e/0x210 [ 639.721916] ? percpu_free_rwsem+0xa0/0xa0 [ 639.726218] uprobe_start_dup_mmap+0x99/0xa0 [ 639.730693] copy_process+0x2b3d/0x7af0 [ 639.734733] ? mark_held_locks+0x160/0x160 [ 639.739018] ? perf_trace_lock+0xde/0x920 [ 639.743220] ? __cleanup_sighand+0x70/0x70 [ 639.747500] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 639.752386] ? zap_class+0x740/0x740 [ 639.756147] ? perf_trace_lock+0x920/0x920 [ 639.760423] ? graph_lock+0x170/0x170 [ 639.764289] ? find_held_lock+0x36/0x1c0 [ 639.768398] ? lock_downgrade+0x8f0/0x8f0 [ 639.772598] ? print_usage_bug+0xc0/0xc0 [ 639.776701] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.781441] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.786186] ? is_bpf_text_address+0xd7/0x170 [ 639.790736] ? print_usage_bug+0xc0/0xc0 [ 639.794897] ? __lock_acquire+0x7fc/0x5020 [ 639.799171] ? __save_stack_trace+0x8d/0xf0 [ 639.803565] ? __lock_acquire+0x7fc/0x5020 [ 639.807847] ? save_stack+0x43/0xd0 [ 639.811584] ? kasan_kmalloc+0xc4/0xe0 [ 639.815515] ? print_usage_bug+0xc0/0xc0 [ 639.819638] ? __alloc_file+0xfc/0x400 [ 639.823567] ? alloc_empty_file+0x72/0x170 [ 639.827840] ? alloc_file+0x5e/0x4d0 [ 639.831607] ? alloc_file_clone+0x25/0xd0 [ 639.835798] ? create_pipe_files+0x471/0x720 [ 639.840250] ? __do_pipe_flags+0x45/0x250 [ 639.844435] ? mark_held_locks+0x160/0x160 [ 639.848712] ? find_held_lock+0x36/0x1c0 [ 639.852818] ? perf_trace_lock+0xde/0x920 [ 639.857017] ? __lock_acquire+0x7fc/0x5020 [ 639.861291] ? zap_class+0x740/0x740 [ 639.865053] ? perf_trace_lock+0x920/0x920 [ 639.869359] ? perf_trace_lock+0xde/0x920 [ 639.873554] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 639.878438] ? zap_class+0x740/0x740 [ 639.882206] ? perf_trace_lock+0x920/0x920 [ 639.886519] ? expand_files.part.8+0x571/0x9c0 [ 639.891130] ? graph_lock+0x170/0x170 [ 639.894970] ? find_held_lock+0x36/0x1c0 [ 639.899087] ? perf_trace_lock+0xde/0x920 [ 639.903289] ? find_held_lock+0x36/0x1c0 [ 639.907432] ? lock_downgrade+0x8f0/0x8f0 [ 639.911615] ? rcu_is_watching+0x8c/0x150 [ 639.915824] ? __lock_is_held+0xb5/0x140 [ 639.919933] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 639.924666] _do_fork+0x1ca/0x1170 [ 639.928253] ? fork_idle+0x240/0x240 [ 639.932009] ? lock_release+0x9f0/0x9f0 [ 639.936075] ? fd_install+0x4d/0x60 [ 639.939772] ? do_syscall_64+0x9a/0x820 [ 639.943808] ? do_syscall_64+0x9a/0x820 [ 639.947826] ? lockdep_hardirqs_on+0x421/0x5c0 [ 639.952474] ? trace_hardirqs_on+0xbd/0x2c0 [ 639.956845] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.962256] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 639.967413] __x64_sys_clone+0xbf/0x150 [ 639.971458] do_syscall_64+0x1b9/0x820 [ 639.975389] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 639.980804] ? syscall_return_slowpath+0x5e0/0x5e0 [ 639.985789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.990685] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 639.995783] ? prepare_exit_to_usermode+0x291/0x3b0 [ 640.000911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.005800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.011061] RIP: 0033:0x7f78fd4a8f46 [ 640.014812] Code: Bad RIP value. [ 640.018713] RSP: 002b:00007ffcefe84b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 640.026500] RAX: ffffffffffffffda RBX: 00007ffcefe84b40 RCX: 00007f78fd4a8f46 [ 640.033816] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 640.041128] RBP: 00007ffcefe84ba0 R08: 0000000000001a95 R09: 0000000000001a95 [ 640.048479] R10: 00007f78fddc5a70 R11: 0000000000000246 R12: 0000000000000000 [ 640.055798] R13: 00007ffcefe84b60 R14: 0000000000000005 R15: 0000000000000005 [ 640.063171] INFO: task udevd:6813 blocked for more than 140 seconds. [ 640.069698] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 640.075445] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 640.083439] udevd D22488 6813 2538 0x00000000 [ 640.089108] Call Trace: [ 640.091743] __schedule+0x87c/0x1df0 [ 640.095538] ? __sched_text_start+0x8/0x8 [ 640.099768] ? graph_lock+0x170/0x170 [ 640.103621] ? print_usage_bug+0xc0/0xc0 [ 640.107746] ? find_held_lock+0x36/0x1c0 [ 640.111847] schedule+0xfb/0x450 [ 640.115305] ? __schedule+0x1df0/0x1df0 [ 640.119321] ? lockdep_hardirqs_on+0x421/0x5c0 [ 640.123974] ? trace_hardirqs_on+0xbd/0x2c0 [ 640.128327] ? kasan_check_read+0x11/0x20 [ 640.132521] ? rwsem_down_read_failed+0x338/0x610 [ 640.137403] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 640.142554] ? kasan_check_write+0x14/0x20 [ 640.146830] ? do_raw_spin_lock+0xc1/0x200 [ 640.151126] rwsem_down_read_failed+0x362/0x610 [ 640.155916] ? rt_mutex_futex_unlock+0x130/0x130 [ 640.160710] ? lock_downgrade+0x8f0/0x8f0 [ 640.164928] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.169646] call_rwsem_down_read_failed+0x18/0x30 [ 640.174638] __percpu_down_read+0x16e/0x210 [ 640.179003] ? percpu_free_rwsem+0xa0/0xa0 [ 640.183306] uprobe_start_dup_mmap+0x99/0xa0 [ 640.187763] copy_process+0x2b3d/0x7af0 [ 640.191791] ? mark_held_locks+0x160/0x160 [ 640.196070] ? perf_trace_lock+0xde/0x920 [ 640.200289] ? __cleanup_sighand+0x70/0x70 [ 640.204565] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 640.209459] ? zap_class+0x740/0x740 [ 640.213258] ? perf_trace_lock+0x920/0x920 [ 640.217525] ? graph_lock+0x170/0x170 [ 640.221393] ? find_held_lock+0x36/0x1c0 [ 640.225502] ? lock_downgrade+0x8f0/0x8f0 [ 640.229721] ? print_usage_bug+0xc0/0xc0 [ 640.233835] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.238562] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.243288] ? is_bpf_text_address+0xd7/0x170 [ 640.247829] ? print_usage_bug+0xc0/0xc0 [ 640.251942] ? __lock_acquire+0x7fc/0x5020 [ 640.256221] ? __save_stack_trace+0x8d/0xf0 [ 640.260602] ? __lock_acquire+0x7fc/0x5020 [ 640.264926] ? save_stack+0x43/0xd0 [ 640.268586] ? kasan_kmalloc+0xc4/0xe0 [ 640.272515] ? print_usage_bug+0xc0/0xc0 [ 640.276617] ? __alloc_file+0xfc/0x400 [ 640.280547] ? alloc_empty_file+0x72/0x170 [ 640.284823] ? alloc_file+0x5e/0x4d0 [ 640.288583] ? alloc_file_clone+0x25/0xd0 [ 640.292774] ? create_pipe_files+0x471/0x720 [ 640.297223] ? __do_pipe_flags+0x45/0x250 [ 640.301408] ? mark_held_locks+0x160/0x160 [ 640.305710] ? find_held_lock+0x36/0x1c0 [ 640.309826] ? perf_trace_lock+0xde/0x920 [ 640.314031] ? __lock_acquire+0x7fc/0x5020 [ 640.318306] ? zap_class+0x740/0x740 [ 640.322065] ? perf_trace_lock+0x920/0x920 [ 640.326338] ? perf_trace_lock+0xde/0x920 [ 640.330566] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 640.335451] ? zap_class+0x740/0x740 [ 640.339237] ? perf_trace_lock+0x920/0x920 [ 640.343568] ? expand_files.part.8+0x571/0x9c0 [ 640.348179] ? graph_lock+0x170/0x170 [ 640.352039] ? find_held_lock+0x36/0x1c0 [ 640.356141] ? perf_trace_lock+0xde/0x920 [ 640.360337] ? find_held_lock+0x36/0x1c0 [ 640.364443] ? lock_downgrade+0x8f0/0x8f0 [ 640.368668] ? rcu_is_watching+0x8c/0x150 [ 640.372897] ? __lock_is_held+0xb5/0x140 [ 640.377019] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.381778] _do_fork+0x1ca/0x1170 [ 640.385374] ? fork_idle+0x240/0x240 [ 640.389150] ? lock_release+0x9f0/0x9f0 [ 640.393167] ? fd_install+0x4d/0x60 [ 640.396862] ? do_syscall_64+0x9a/0x820 [ 640.400918] ? do_syscall_64+0x9a/0x820 [ 640.404950] ? lockdep_hardirqs_on+0x421/0x5c0 [ 640.409595] ? trace_hardirqs_on+0xbd/0x2c0 [ 640.413969] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.419399] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 640.424538] __x64_sys_clone+0xbf/0x150 [ 640.428563] do_syscall_64+0x1b9/0x820 [ 640.432517] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 640.437938] ? syscall_return_slowpath+0x5e0/0x5e0 [ 640.442922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.447815] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 640.452917] ? prepare_exit_to_usermode+0x291/0x3b0 [ 640.458003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.462915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.468159] RIP: 0033:0x7f78fd4a8f46 [ 640.471945] Code: Bad RIP value. [ 640.475358] RSP: 002b:00007ffcefe84b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 640.483112] RAX: ffffffffffffffda RBX: 00007ffcefe84b40 RCX: 00007f78fd4a8f46 [ 640.490432] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 640.497742] RBP: 00007ffcefe84ba0 R08: 0000000000001a9d R09: 0000000000001a9d [ 640.505053] R10: 00007f78fddc5a70 R11: 0000000000000246 R12: 0000000000000000 [ 640.512356] R13: 00007ffcefe84b60 R14: 0000000000000005 R15: 0000000000000005 [ 640.519701] INFO: task udevd:7279 blocked for more than 140 seconds. [ 640.526233] Not tainted 4.19.0-rc2-next-20180904+ #55 [ 640.531977] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 640.539971] udevd D22944 7279 2538 0x00000000 [ 640.545643] Call Trace: [ 640.548272] __schedule+0x87c/0x1df0 [ 640.552037] ? __sched_text_start+0x8/0x8 [ 640.556229] ? graph_lock+0x170/0x170 [ 640.560079] ? print_usage_bug+0xc0/0xc0 [ 640.564202] ? find_held_lock+0x36/0x1c0 [ 640.568308] schedule+0xfb/0x450 [ 640.571719] ? __schedule+0x1df0/0x1df0 [ 640.575751] ? lockdep_hardirqs_on+0x421/0x5c0 [ 640.580377] ? trace_hardirqs_on+0xbd/0x2c0 [ 640.584749] ? kasan_check_read+0x11/0x20 [ 640.588953] ? rwsem_down_read_failed+0x338/0x610 [ 640.593837] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 640.599019] ? kasan_check_write+0x14/0x20 [ 640.603294] ? do_raw_spin_lock+0xc1/0x200 [ 640.607582] rwsem_down_read_failed+0x362/0x610 [ 640.612297] ? rt_mutex_futex_unlock+0x130/0x130 [ 640.617103] ? lock_downgrade+0x8f0/0x8f0 [ 640.621297] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.626035] call_rwsem_down_read_failed+0x18/0x30 [ 640.631040] __percpu_down_read+0x16e/0x210 [ 640.635393] ? percpu_free_rwsem+0xa0/0xa0 [ 640.639686] uprobe_start_dup_mmap+0x99/0xa0 [ 640.644145] copy_process+0x2b3d/0x7af0 [ 640.648169] ? mark_held_locks+0x160/0x160 [ 640.652447] ? perf_trace_lock+0xde/0x920 [ 640.656690] ? __cleanup_sighand+0x70/0x70 [ 640.660977] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 640.665901] ? zap_class+0x740/0x740 [ 640.669656] ? perf_trace_lock+0x920/0x920 [ 640.673952] ? graph_lock+0x170/0x170 [ 640.677801] ? find_held_lock+0x36/0x1c0 [ 640.681959] ? lock_downgrade+0x8f0/0x8f0 [ 640.686171] ? print_usage_bug+0xc0/0xc0 [ 640.690282] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.694994] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.699717] ? is_bpf_text_address+0xd7/0x170 [ 640.704266] ? print_usage_bug+0xc0/0xc0 [ 640.708375] ? __lock_acquire+0x7fc/0x5020 [ 640.712649] ? __save_stack_trace+0x8d/0xf0 [ 640.717032] ? __lock_acquire+0x7fc/0x5020 [ 640.721331] ? save_stack+0x43/0xd0 [ 640.725009] ? kasan_kmalloc+0xc4/0xe0 [ 640.728962] ? print_usage_bug+0xc0/0xc0 [ 640.733074] ? __alloc_file+0xfc/0x400 [ 640.737022] ? alloc_empty_file+0x72/0x170 [ 640.741286] ? alloc_file+0x5e/0x4d0 [ 640.745038] ? alloc_file_clone+0x25/0xd0 [ 640.749223] ? create_pipe_files+0x471/0x720 [ 640.753684] ? __do_pipe_flags+0x45/0x250 [ 640.757913] ? mark_held_locks+0x160/0x160 [ 640.762203] ? find_held_lock+0x36/0x1c0 [ 640.766308] ? perf_trace_lock+0xde/0x920 [ 640.770505] ? __lock_acquire+0x7fc/0x5020 [ 640.774796] ? zap_class+0x740/0x740 [ 640.778560] ? perf_trace_lock+0x920/0x920 [ 640.782840] ? perf_trace_lock+0xde/0x920 [ 640.787054] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 640.791971] ? zap_class+0x740/0x740 [ 640.795715] ? perf_trace_lock+0x920/0x920 [ 640.799994] ? expand_files.part.8+0x571/0x9c0 [ 640.804619] ? graph_lock+0x170/0x170 [ 640.808462] ? find_held_lock+0x36/0x1c0 [ 640.812588] ? perf_trace_lock+0xde/0x920 [ 640.816794] ? find_held_lock+0x36/0x1c0 [ 640.820927] ? lock_downgrade+0x8f0/0x8f0 [ 640.825149] ? rcu_is_watching+0x8c/0x150 [ 640.829380] ? __lock_is_held+0xb5/0x140 [ 640.833472] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 640.838211] _do_fork+0x1ca/0x1170 [ 640.841795] ? fork_idle+0x240/0x240 [ 640.845560] ? lock_release+0x9f0/0x9f0 [ 640.849591] ? fd_install+0x4d/0x60 [ 640.853266] ? do_syscall_64+0x9a/0x820 [ 640.857282] ? do_syscall_64+0x9a/0x820 [ 640.861323] ? lockdep_hardirqs_on+0x421/0x5c0 [ 640.865975] ? trace_hardirqs_on+0xbd/0x2c0 [ 640.870328] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.875741] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 640.880908] __x64_sys_clone+0xbf/0x150 [ 640.884980] do_syscall_64+0x1b9/0x820 [ 640.888919] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 640.894351] ? syscall_return_slowpath+0x5e0/0x5e0 [ 640.899323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.904210] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 640.909280] ? prepare_exit_to_usermode+0x291/0x3b0 [ 640.914348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.919243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.924475] RIP: 0033:0x7f78fd4a8f46 [ 640.928220] Code: Bad RIP value. [ 640.931655] RSP: 002b:00007ffcefe84b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 640.939419] RAX: ffffffffffffffda RBX: 00007ffcefe84b40 RCX: 00007f78fd4a8f46 [ 640.946738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 640.954046] RBP: 00007ffcefe84ba0 R08: 0000000000001c6f R09: 0000000000001c6f [ 640.961356] R10: 00007f78fddc5a70 R11: 0000000000000246 R12: 0000000000000000 [ 640.968657] R13: 00007ffcefe84b60 R14: 0000000000000005 R15: 0000000000000005 [ 640.976295] [ 640.976295] Showing all locks held in the system: [ 640.982663] 1 lock held by khungtaskd/792: [ 640.986937] #0: 00000000010c3b8a (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x428 [ 640.995630] 1 lock held by rsyslogd/4614: [ 640.999815] 2 locks held by getty/4704: [ 641.003821] #0: 000000007272e650 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 641.012191] #1: 00000000d0ad5199 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 641.021192] 2 locks held by getty/4705: [ 641.025202] #0: 00000000ee01b3d2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 641.033498] #1: 00000000cb4b72e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 641.042421] 2 locks held by getty/4706: [ 641.046428] #0: 00000000b1d1bfa1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 641.054776] #1: 00000000d8a1ad0c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 641.064108] 2 locks held by getty/4707: [ 641.068109] #0: 00000000d748ecc1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 641.076399] #1: 000000003e534095 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 641.085340] 2 locks held by getty/4708: [ 641.089348] #0: 000000008ec58632 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 641.097665] #1: 00000000f247898c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 641.106585] 2 locks held by getty/4709: [ 641.110585] #0: 000000001ebc9104 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 641.118905] #1: 00000000c5deaf68 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 641.127897] 2 locks held by getty/4710: [ 641.131914] #0: 00000000da7ef2b1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 641.140203] #1: 000000003a231089 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 641.149129] 1 lock held by udevd/4711: [ 641.153046] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.161302] 1 lock held by udevd/4712: [ 641.165212] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.173429] 1 lock held by syz-executor0/4752: [ 641.178044] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.186281] 1 lock held by syz-executor1/4754: [ 641.190907] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.199118] 1 lock held by syz-executor6/4756: [ 641.203770] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.211999] 1 lock held by syz-executor7/4758: [ 641.216607] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.224822] 1 lock held by udevd/6793: [ 641.228780] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.236990] 1 lock held by udevd/6805: [ 641.240916] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.249121] 1 lock held by udevd/6813: [ 641.253036] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.261268] 1 lock held by udevd/7279: [ 641.265182] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.273530] 1 lock held by syz-executor0/18570: [ 641.278232] #0: 00000000077431f3 (&dup_mmap_sem){++++}, at: copy_process+0x2b3d/0x7af0 [ 641.286461] 1 lock held by syz-executor5/30110: [ 641.291169] #0: 00000000df7208fd (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 [ 641.299606] 5 locks held by syz-executor5/30115: [ 641.304462] #0: 00000000432a4d43 (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x12fe/0x2f30 [ 641.314525] #1: 0000000043990672 (&pmus_srcu){....}, at: perf_event_alloc.part.93+0xffc/0x33c0 [ 641.323443] #2: 00000000df7208fd (event_mutex){+.+.}, at: perf_uprobe_init+0x1da/0x280 [ 641.331673] #3: 00000000eb6356ce (&uprobe->register_rwsem){+.+.}, at: uprobe_register+0x3dd/0x7c0 [ 641.340885] #4: 00000000077431f3 (&dup_mmap_sem){++++}, at: percpu_down_write+0xaf/0x540 [ 641.349307] 1 lock held by syz-executor4/30114: [ 641.354038] #0: 00000000df7208fd (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 [ 641.362374] 3 locks held by syz-executor4/30117: [ 641.367164] #0: 000000007654572a (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x12fe/0x2f30 [ 641.377189] #1: 0000000043990672 (&pmus_srcu){....}, at: perf_event_alloc.part.93+0xffc/0x33c0 [ 641.381349] kworker/dying (7) used greatest stack depth: 11432 bytes left [ 641.386493] #2: 00000000df7208fd (event_mutex){+.+.}, at: perf_trace_init+0x50/0x250 [ 641.401356] 3 locks held by syz-executor3/30125: [ 641.406141] #0: 00000000fc87ade4 (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x12fe/0x2f30 [ 641.416190] #1: 0000000043990672 (&pmus_srcu){....}, at: perf_event_alloc.part.93+0xffc/0x33c0 [ 641.425101] #2: 00000000df7208fd (event_mutex){+.+.}, at: perf_trace_init+0x50/0x250 [ 641.433153] 3 locks held by syz-executor2/30129: [ 641.437943] #0: 00000000d282122d (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x12fe/0x2f30 [ 641.447990] #1: 0000000043990672 (&pmus_srcu){....}, at: perf_event_alloc.part.93+0xffc/0x33c0 [ 641.456910] #2: 00000000df7208fd (event_mutex){+.+.}, at: perf_trace_init+0x50/0x250 [ 641.464976] [ 641.466631] ============================================= [ 641.466631] [ 641.473692] NMI backtrace for cpu 0 [ 641.477376] CPU: 0 PID: 792 Comm: khungtaskd Not tainted 4.19.0-rc2-next-20180904+ #55 [ 641.485418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.494777] Call Trace: [ 641.497354] dump_stack+0x1c9/0x2b4 [ 641.500972] ? dump_stack_print_info.cold.2+0x52/0x52 [ 641.506152] ? vprintk_default+0x28/0x30 [ 641.510208] ? lapic_can_unplug_cpu.cold.29+0x3f/0x3f [ 641.515397] nmi_cpu_backtrace.cold.3+0x48/0x88 [ 641.520053] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 641.524713] ? lapic_can_unplug_cpu.cold.29+0x3f/0x3f [ 641.529904] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 641.535173] arch_trigger_cpumask_backtrace+0x14/0x20 [ 641.540354] watchdog+0xb39/0x1040 [ 641.543908] ? reset_hung_task_detector+0xd0/0xd0 [ 641.548752] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 641.553843] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 641.558940] ? lockdep_hardirqs_on+0x421/0x5c0 [ 641.563511] ? trace_hardirqs_on+0xbd/0x2c0 [ 641.567822] ? kasan_check_read+0x11/0x20 [ 641.571976] ? __kthread_parkme+0xd7/0x1b0 [ 641.576202] ? kasan_check_write+0x14/0x20 [ 641.580424] ? do_raw_spin_lock+0xc1/0x200 [ 641.584659] ? __kthread_parkme+0x58/0x1b0 [ 641.588900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 641.594430] ? __kthread_parkme+0x106/0x1b0 [ 641.598747] kthread+0x35a/0x420 [ 641.602103] ? reset_hung_task_detector+0xd0/0xd0 [ 641.606930] ? kthread_bind+0x40/0x40 [ 641.610724] ret_from_fork+0x3a/0x50 [ 641.614499] Sending NMI from CPU 0 to CPUs 1: [ 641.619082] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x6/0x10 [ 641.620036] Kernel panic - not syncing: hung_task: blocked tasks [ 641.632773] CPU: 0 PID: 792 Comm: khungtaskd Not tainted 4.19.0-rc2-next-20180904+ #55 [ 641.640810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.650145] Call Trace: [ 641.652721] dump_stack+0x1c9/0x2b4 [ 641.656347] ? dump_stack_print_info.cold.2+0x52/0x52 [ 641.661527] ? printk_safe_log_store+0x2f0/0x2f0 [ 641.666275] panic+0x238/0x4e7 [ 641.669457] ? add_taint.cold.5+0x16/0x16 [ 641.673598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.679126] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 641.684566] ? printk_safe_flush+0xd7/0x130 [ 641.688892] watchdog+0xb4a/0x1040 [ 641.692432] ? reset_hung_task_detector+0xd0/0xd0 [ 641.697285] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 641.702376] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 641.707467] ? lockdep_hardirqs_on+0x421/0x5c0 [ 641.712037] ? trace_hardirqs_on+0xbd/0x2c0 [ 641.716349] ? kasan_check_read+0x11/0x20 [ 641.720487] ? __kthread_parkme+0xd7/0x1b0 [ 641.724713] ? kasan_check_write+0x14/0x20 [ 641.728948] ? do_raw_spin_lock+0xc1/0x200 [ 641.733173] ? __kthread_parkme+0x58/0x1b0 [ 641.737398] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 641.742924] ? __kthread_parkme+0x106/0x1b0 [ 641.747237] kthread+0x35a/0x420 [ 641.750608] ? reset_hung_task_detector+0xd0/0xd0 [ 641.755435] ? kthread_bind+0x40/0x40 [ 641.759225] ret_from_fork+0x3a/0x50 [ 641.763352] Dumping ftrace buffer: [ 641.766975] (ftrace buffer empty) [ 641.770674] Kernel Offset: disabled [ 641.774294] Rebooting in 86400 seconds..