a0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x3c, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:07 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x7, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:07 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x1c4, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x32, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000300)=""/205, 0xcd}], 0x1, &(0x7f0000000780)=""/210, 0xd2}}, {{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/70, 0x46}], 0x1, &(0x7f0000000b00)=""/222, 0xde, 0x80}, 0x100}], 0x2, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x4, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x15, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x1c4, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffff94, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x31, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:08 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:08 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x1c4, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x2a, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:08 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000300)=""/205, 0xcd}], 0x1, &(0x7f0000000780)=""/210, 0xd2}}, {{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/222, 0xde, 0x80}, 0x100}], 0x2, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x36, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffbd, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 262.373409] 9pnet: Insufficient options for proto=fd [ 262.391198] 9pnet: Insufficient options for proto=fd 08:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x3, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x4f, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x1c4, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x49, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:09 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x62, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:09 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x33, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:09 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000300)=""/205, 0xcd}], 0x1, &(0x7f0000000780)=""/210, 0xd2}}, {{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/222, 0xde, 0x80}, 0x100}], 0x2, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x69, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x18, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:09 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:09 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x2d, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:09 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') [ 263.428986] 9pnet: Insufficient options for proto=fd 08:21:10 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x7b, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:10 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x19, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000300)=""/205, 0xcd}], 0x1, &(0x7f0000000780)=""/210, 0xd2}}, {{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/222, 0xde, 0x80}, 0x100}], 0x2, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) [ 264.076475] 9pnet: Insufficient options for proto=fd 08:21:10 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x64, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x13, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:10 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x25, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:11 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x37, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:11 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[], 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffa7, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000300)=""/205, 0xcd}], 0x1, &(0x7f0000000780)=""/210, 0xd2}}, {{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/70, 0x46}], 0x1, &(0x7f0000000b00)=""/222, 0xde}, 0x100}], 0x2, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x4d, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffa4, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:11 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x2, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffff84, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:11 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a0000002901000000000000000000000000000000"], 0x15) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x1c, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:12 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:12 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x7d, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000300)=""/205, 0xcd}], 0x1, &(0x7f0000000780)=""/210, 0xd2}}, {{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/70, 0x46}], 0x1, &(0x7f0000000b00)=""/222, 0xde}}], 0x2, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:12 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a00000029010000000000000000000000000000000000000000000000000000"], 0x20) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x2b, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffdd, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:12 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e10"], 0x25) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffc7, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x48, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:12 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c"], 0x28) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x5, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x35, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:13 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:13 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c65"], 0x29) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:13 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x4e, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x71, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/70, 0x46}], 0x1, &(0x7f0000000b00)=""/222, 0xde}}], 0x1, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x4, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:13 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x24, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xc, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:13 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:14 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x4c, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x45, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:14 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:14 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/70, 0x46}], 0x1, &(0x7f0000000b00)=""/222, 0xde}}], 0x1, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xf, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:14 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[], 0x0) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x16, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x7c, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x3b, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:14 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:14 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffdc, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:14 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x1b, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:14 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f010001000000"], 0xb) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/70, 0x46}], 0x1, &(0x7f0000000b00)=""/222, 0xde}}], 0x1, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x23, 0x0, 0x29, 0x2}, 0x1c2) 08:21:14 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f010001000000000000000000"], 0x11) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x57, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x3, 0x0, 0x29, 0x2}, 0x1c2) 08:21:15 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3"], 0x14) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffcd, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:15 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x200011b2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x6b, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:15 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3fe"], 0x15) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/222, 0xde}}], 0x1, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0xf, 0x0, 0x29, 0x2}, 0x1c2) 08:21:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x67, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:15 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x1000000, 0x29, 0x2}, 0x1c2) 08:21:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x5d, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:16 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x2000000, 0x29, 0x2}, 0x1c2) 08:21:16 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x0, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x47, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/222, 0xde}}], 0x1, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffff95, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:16 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x3c, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x2, 0x29, 0x2}, 0x1c2) 08:21:16 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:17 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:17 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x100000000000000, 0x29, 0x2}, 0x1c2) 08:21:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x15, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:17 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/222, 0xde}}], 0x1, 0x0, &(0x7f0000000c80)={0x0, 0x1c9c380}) 08:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x200000000000000, 0x29, 0x2}, 0x1c2) 08:21:17 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0x5f, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x3a, 0x2}, 0x1c2) 08:21:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x37}, 0x1c2) 08:21:18 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:18 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x700000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0xb}, 0x1c2) 08:21:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:18 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x3b}, 0x1c2) 08:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x4}, 0x1c2) 08:21:18 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7400000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x36}, 0x1c2) 08:21:19 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x20000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x3}, 0x1c2) 08:21:19 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x39}, 0x1c2) 08:21:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xff000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:19 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x8}, 0x1c2) 08:21:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x32}, 0x1c2) 08:21:20 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x22000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:20 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x34}, 0x1c2) 08:21:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x43}, 0x1c2) 08:21:20 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xff00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x5}, 0x1c2) 08:21:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xc0ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x3e}, 0x1c2) [ 273.901532] 9pnet: Insufficient options for proto=fd 08:21:20 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:20 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x3) 08:21:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4c000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x200011b2) [ 274.630139] 9pnet: Insufficient options for proto=fd 08:21:21 executing program 0: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0xf) 08:21:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:21 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x23) 08:21:21 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000100)={r1, 0x3}) r2 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r2, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7400, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:21 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x480000, 0x0) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:21 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = dup3(r0, r0, 0x80000) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="64652e0f217bbaf80c66b852d0808266efbafc0cec0f68afeda166b80d0000000f23d00f21f86635100000000f23f82e0f22da0f972ff3a6a564260fc76e00f082999c368a", 0x45}], 0x1, 0x40, &(0x7f0000000140)=[@cr0={0x0, 0x8004001a}], 0x1) setsockopt$inet_int(r1, 0x0, 0x26, &(0x7f0000000040)=0x7fffffff, 0x4) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000200)={0x4, 0x0, [{0xb11, 0x0, 0x9}, {0x953, 0x0, 0x5}, {0xac2, 0x0, 0x7}, {0x2d4, 0x0, 0x9}]}) 08:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x10) 08:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0xffffffff, 0x7, 0x9}) 08:21:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe8030000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:22 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:22 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x68000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x70000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:22 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffff9c, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0x0, @ipv4={[], [], @rand_addr=0x6}, 0x346d}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:22 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) setpgid(r0, r1) r2 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r2, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:23 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0x10}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x74, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:23 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:23 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x600000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={0xffffffffffffff9c}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100000000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x400}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004810}, 0x80) r2 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r2, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xd0ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:23 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:23 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 08:21:23 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x400000) recvmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)=""/65, 0x41}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/49, 0x31}, {&(0x7f0000000300)=""/119, 0x77}], 0x4, &(0x7f00000003c0)=""/135, 0x87, 0xff}, 0x100) r2 = getuid() setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x80, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {{@in=@multicast1, 0x1000000000000000}, 0x0, @in6}}, 0xe8) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f00000004c0)={0x8000000001c2, 0x0, 0x29, 0xfffffffff23bda23}, 0x10) 08:21:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x60000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x70000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:24 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0x20000275}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x2200, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:24 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=""/119, 0x77) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, r1}, {}, {}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x10}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x4) chmod(&(0x7f0000000080)='./file0\x00', 0x24) r2 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r2, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000300)=""/2, 0x2) syslog(0x11, &(0x7f00000000c0)=""/16, 0x10) 08:21:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:24 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:24 executing program 0: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe803, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x101, 0x280c00) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x13304e721fd3c63b, 'bridge_slave_0\x00'}, 0x18) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x1f, 0x7940}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000480)=@sack_info={0x0, 0x4, 0x7fffffff}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000440)={r2, 0x100}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x7fffffff}, &(0x7f0000000200)=0x8) 08:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000040)={0x1c2, 0x0, 0x0, 0x2}, 0x352) 08:21:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x10, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffff90, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:25 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0x7ffff000}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x8040, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80000) 08:21:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffffd0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) 08:21:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:25 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x101400, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000240)={0x0, 0x6, 0x9, &(0x7f0000000200)=0x3}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f00000002c0)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x3}) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000080)={0x1c2, 0x0, 0x27, 0x2}, 0x10) 08:21:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4800, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:25 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6c, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:26 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xffffffffffffffff}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:26 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:26 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:26 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe4ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, &(0x7f0000000440)="66ba4100ed2e0fc71f67260f21ee66430f73f0dc81a69f0200002b760000656666430fefaa525d0000b921090000b80a000000ba000000000f30b8010000000f01c1d9e90f23f6", 0x47}], 0x1, 0x0, &(0x7f00000000c0), 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000280)=0x1ff, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) close(0xffffffffffffffff) r4 = dup3(r1, r3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) socket$nl_generic(0xa, 0x3, 0x10) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r6, 0xc008ae05, &(0x7f0000000080)=""/197) setsockopt$netlink_NETLINK_RX_RING(r6, 0x29, 0x6, &(0x7f0000000ff0)={0x19, 0x1, 0x29, 0x800000002}, 0xffffffffffffffec) 08:21:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x74000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:26 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 279.973694] Unknown ioctl -1073172987 08:21:26 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6c000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xa00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:27 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x3fd80}], 0x2}, 0x0) 08:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:27 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:27 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0x9, 0x80000000, 0x9, 0x7}) r1 = socket$nl_generic(0xa, 0x3, 0x10) write$P9_RLERROR(r0, &(0x7f00000000c0)={0x12, 0x7, 0x1, {0x9, '/dev/dsp\x00'}}, 0x12) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:27 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:27 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x400, 0x100) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6000000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:27 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:27 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x40000574}], 0x2}, 0x0) 08:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xffffffffffffffc1, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000100)={0x18, 0xd, 0x1, {{0x20, 0x4, 0x6}, 0x81}}, 0x18) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000080), 0x4) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x3, 0x9, 0x1}}, 0x28) 08:21:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5600, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:27 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:27 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffffb0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:27 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x9, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:28 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=0x0, &(0x7f0000000400)=0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000440)={r1, 0x5}, &(0x7f0000000480)=0x8) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000240)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r3 = socket$nl_generic(0xa, 0x3, 0x10) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xf05, 0x400000) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) ioctl$PPPOEIOCSFWD(r4, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x4, @broadcast, 'veth1_to_bond\x00'}}) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:28 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x7fffef0b}], 0x2}, 0x0) 08:21:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffffa0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:28 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f00000000c0)={r2, 0x8}) getpeername$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) syncfs(r0) 08:21:28 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x68, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:28 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:28 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:28 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe803000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x142, 0x0, 0x29, 0x2}, 0x10) 08:21:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x40000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:29 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0xfd80}], 0x2}, 0x0) 08:21:29 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:29 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:29 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:29 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:29 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvfrom(r0, &(0x7f0000000040)=""/95, 0x5f, 0x40000040, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f00000000c0)=0x7f, 0x4) sendmmsg(r2, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000500)}}], 0xff, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) prctl$setendian(0x14, 0x2) 08:21:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:29 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x2200000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:29 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4800000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:29 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x500000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:30 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x1fd80}], 0x2}, 0x0) 08:21:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:30 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:30 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:30 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x10000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:30 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 08:21:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r2 = fcntl$getown(r0, 0x9) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r3, &(0x7f0000000000)="04010000008b00ddb846070000005b4802938207d9033780398d5375a41640939029ef0712f295133e05e0f1a6e793c1f62e03f08faba46f8f2575eb15ce43af6a8e2f61a1945aa0353c72e475f80b54482c03ac4db09698c0e2d2000004000000fffba3", 0x64, 0x0, &(0x7f0000000080)={0xa, 0x204000800, 0x5}, 0x1c) syz_open_procfs(r2, &(0x7f0000000040)='pagemap\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2, 0x0) 08:21:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:30 executing program 0: write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xa, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 284.454639] 9pnet: Insufficient options for proto=fd [ 284.492217] 9pnet: Insufficient options for proto=fd 08:21:31 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) getpeername$netlink(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) accept$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000280)=0x60) r1 = socket$nl_generic(0xa, 0x3, 0x10) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000140)=0xc) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) socket$nl_generic(0x10, 0x3, 0x10) 08:21:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:31 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x2fd80}], 0x2}, 0x0) 08:21:31 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 08:21:31 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:31 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x500) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x7, 0xc0e, 0x0, 0x0, 0x1000, 0x9, 0xfff, 0x1, 0x1e, 0x5, 0x7772}, 0xb) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3e8, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:31 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) accept$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x9, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x29ee}, @alu={0x7, 0x3, 0x8, 0xa, 0x7, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x139a}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1574, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x8}, 0x48) 08:21:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 285.223203] 9pnet: Insufficient options for proto=fd 08:21:31 executing program 2: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 08:21:31 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 285.342777] 9pnet: Insufficient options for proto=fd 08:21:32 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x34}, 0x0) 08:21:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'yam0\x00', 0x3}) 08:21:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:32 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x1000002, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0), 0x4) syz_emit_ethernet(0xffffffe9, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0xa9e, 0x2c, 0x0, @local, @local, {[], @tcp={{0x2100, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) 08:21:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:32 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x84000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ptype\x00') r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xfffffffffffff800, 0x10000) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r1, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x800) r4 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r4, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 286.012928] dccp_invalid_packet: invalid packet type 08:21:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x1000000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 286.082153] dccp_invalid_packet: invalid packet type 08:21:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {}, {0xffffffffffffffff}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:33 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x10}, 0x0) 08:21:33 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[], 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x30000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:33 executing program 2: 08:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x600, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x401, 0x5, 0x24, &(0x7f0000ffb000/0x2000)=nil, 0xff}) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:33 executing program 2: 08:21:33 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x10000, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r3 = socket$nl_generic(0xa, 0x3, 0x10) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'bridge_slave_0\x00', {0x2, 0x4e20, @multicast1}}) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x700, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:33 executing program 2: 08:21:33 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x468400, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f0000000200)=0x1e) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x100, 0x4) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)=0x0) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000600)={'vcan0\x00', r4}) setregid(r2, r3) 08:21:33 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x8}, 0x0) 08:21:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffff80, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:33 executing program 2: 08:21:33 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a0000002901000000000000000000000000000000"], 0x15) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) socketpair$inet(0x2, 0x8080e, 0xfffffffffffffffe, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000140)=0x4) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000007280)={0x0, 0x0, 0x2080}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:33 executing program 2: 08:21:33 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a00000029010000000000000000000000000000000000000000000000000000"], 0x20) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x60, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5600000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:34 executing program 2: 08:21:34 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x200000000000000}, 0x0) 08:21:34 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000200)={{0x90a7, 0x51, 0x8, 0x8001, 0x87f, 0x9}, 0xfff}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x400440) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000080)="b238af6a36bde28fbe4b480c080f686baabee2d718e3eadbec0c955a63fc577cc7e2a244be83fc117aa174909752eb81ec4e851f02fea448d1a8e5a9373178800a781b1015687da1a194e661f6f1a269dec238c04f8a4da5de0abca97f6b3ee0ad8993effa39a45fcbbddc47fedb935ef55ebc303930d7eaf28fd8e6891ba2c64781d231b0d4547bee4404") perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r2 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r2, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:34 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e10"], 0x25) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3000000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x40096101, &(0x7f00000004c0)) [ 288.529634] QAT: Device 0 not found 08:21:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x56, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 288.556690] QAT: Device 0 not found 08:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = accept(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x2c, @multicast2, 0x4e23, 0x4, 'ovf\x00', 0x4, 0x6, 0x8}, {@broadcast, 0x4e23, 0x0, 0xffff, 0x80000000, 0x3}}, 0x44) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) dup2(r2, r1) 08:21:34 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c"], 0x28) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7a, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000200)={0x10f, 0x29, 0x2, {0x3f, [{{0x20, 0x3}, 0xff, 0x32ed, 0xd, './file0/file0'}, {{0xe8, 0x0, 0x5}, 0x6, 0x7fffffff, 0x7, './file0'}, {{0x8, 0x0, 0x8}, 0x6f, 0x100000000, 0x7, './file0'}, {{0xa, 0x0, 0x2}, 0x10000, 0x80000000, 0x7, './file0'}, {{0x20, 0x1, 0x4}, 0xffff, 0x9, 0xd, './file0/file0'}, {{0x84, 0x3, 0x5}, 0x4, 0x3, 0x7, './file0'}, {{0x0, 0x4, 0x8}, 0x8, 0x100000001, 0x7, './file0'}, {{0x44, 0x2, 0x7}, 0x9, 0x8000000, 0x7, './file0'}]}}, 0x10f) 08:21:35 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x300000000000000}, 0x0) 08:21:35 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c65"], 0x29) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe4ffffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:35 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800f, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028, 0xff0f]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='scalable\x00', 0x9) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 08:21:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {}, {}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {{@in6=@dev={0xfe, 0x80, [], 0x17}}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f00000002c0)={0x1c2, 0x0, 0x29, 0x200002}, 0xd0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x1, 0x2440) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast2}, 0x10) 08:21:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x80ffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:35 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@remote, @empty, @loopback, 0x6, 0x7, 0xffffffffffff810b, 0x500, 0x5, 0x50080, r1}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fe}, {0x0, 0x0, 0x0, 0x30000}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0x0, @in6, 0x34ff, 0x8, 0x0, 0x0, 0x0, 0x4}}, 0xe8) r2 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r2, 0x29, 0x6, &(0x7f0000000ff0)={0x1bf, 0x400000004, 0x7, 0x2}, 0xfffffffffffffecf) 08:21:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x10000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xb0861d00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:36 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x300}, 0x0) 08:21:36 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) setsockopt$inet6_buf(r0, 0x29, 0xcd, &(0x7f0000000200)="60ad8eaf58fdd18854038bb9a96a4eb3203a331a739c47add8f0e5397dc82a19a6b318bec1bdd4ca8b8db9bf8ade96a2dc15ab0ca776ca7118503885bd80f7657760c79f03492c62565199f4096c6d04c1b568c296f20bf29133ae667abface0da53ace275e37aecf26461965c01c867aeed698daa4d805b1fe57fa34316ad30753e455cb5fc7c979d93f53d7fae30236f301a9162e43926c12e88253aebf223e530429d5b50fa24", 0xa8) r1 = socket$nl_generic(0xa, 0x3, 0x10) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="74e830219f626c7331"]) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:36 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x4, 0x4, 0x1, 0x4, 0xffffffffffffff9c}, 0x2c) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000100)=""/232, 0xe8, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0xffffffffffffffd2) r0 = getpid() ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000300)={0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200)={0x9}, 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r2, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x28, 0x1, @tid=r0}) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x5, 0x52, 0x3, 0x4, 0x0, 0x0, 0x9703, 0x7f, 0xec0e, 0x0, 0x9}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fadvise64(r1, 0x0, 0x1de6, 0x3) 08:21:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x48000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:36 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0xa000000000000000, 0x200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r2, 0x301, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x24040010}, 0x20040080) r3 = socket$nl_generic(0xa, 0x3, 0x10) r4 = semget(0x0, 0x0, 0x20) semctl$GETVAL(r4, 0x3, 0xc, &(0x7f0000000080)=""/216) r5 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000400)=0x2bd3, 0x4) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x22) r6 = shmget$private(0x0, 0x3000, 0x1008, &(0x7f0000ffb000/0x3000)=nil) shmat(r6, &(0x7f0000ffb000/0x3000)=nil, 0x2000) 08:21:36 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[], 0x0) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x2000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:37 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:37 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x10}, 0x0) 08:21:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xa000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {}, {}, 0xfffffffffffffffe}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000040)=""/247, &(0x7f0000000140)=0xf7) 08:21:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x4, 0x4, 0x1, 0x4, 0xffffffffffffff9c}, 0x2c) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000100)=""/232, 0xe8, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0xffffffffffffffd2) r0 = getpid() ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000300)={0x0, 0x0, 0x7fff, &(0x7f00000002c0)=0x4}) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socket$inet_sctp(0x2, 0x5, 0x84) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x5, 0x52, 0x3, 0x0, 0x0, 0x0, 0x9703, 0x0, 0xec0e, 0x0, 0x9}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fadvise64(r1, 0x0, 0x1de6, 0x3) 08:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003b00)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000003b40)=0x5) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x90ffffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:37 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f010001000000"], 0xb) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0xfffffffffffffcc6) 08:21:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4000000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:38 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x100000000000000}, 0x0) 08:21:38 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f010001000000000000000000"], 0x11) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x400000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x1000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:38 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) accept4$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x10, 0x80000) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) rt_sigtimedwait(&(0x7f0000000040)={0x6}, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}, 0x8) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) socket$inet_icmp_raw(0x2, 0x3, 0x1) 08:21:38 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3"], 0x14) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6c00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x100000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:38 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3fe"], 0x15) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:39 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:39 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x2000000}, 0x0) 08:21:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000040)={0x1ff, 0x4, 0x2d, 0x37b}, 0x10) 08:21:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x1c545f, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:39 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x0, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x48, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x7b, @multicast2, 0x4e24, 0x4, 'nq\x00', 0x4, 0x6, 0x9}, 0x2c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x6, 0x7fff, 0x7, 0x0, 0x5d0, 0x8000, 0x8, 0x3, 0xe43f, 0x1, 0xb0, 0x5, 0x824, 0x1, 0x4, 0x8, 0x800, 0xf05, 0x65, 0x5, 0x3, 0x8, 0x1, 0x8, 0x9, 0x7, 0xffffffffffff8000, 0x5, 0x5, 0x20, 0x8, 0x401, 0x7fff, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x140, 0x9964, 0xff, 0x5, 0x4, 0x3, 0x1f}, r2, 0xc, r0, 0x4) r3 = socket$nl_generic(0xa, 0x3, 0x10) fadvise64(r2, 0x0, 0x5, 0x5) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xf, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:39 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:39 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x3000000}, 0x0) 08:21:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:39 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0xfd03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x300000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 293.753943] FS-Cache: Duplicate cookie detected [ 293.758813] FS-Cache: O-cookie c=00000000c7bac9d3 [p=000000002d4b6a1f fl=222 nc=0 na=1] [ 293.758823] FS-Cache: O-cookie d=000000003784870e n=00000000f29e15a4 [ 293.758834] FS-Cache: O-key=[10] '34323934393636343931' [ 293.779002] FS-Cache: N-cookie c=00000000d9de55e0 [p=000000002d4b6a1f fl=2 nc=0 na=1] [ 293.787096] FS-Cache: N-cookie d=000000003784870e n=0000000019706704 [ 293.793605] FS-Cache: N-key=[10] '34323934393636343931' 08:21:40 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffff8000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:40 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101000, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0xffffffffffffff02) 08:21:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x30, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:40 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x700}, 0x0) 08:21:40 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:40 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x400) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x3e, 0x2, 0x7ff, "4726443d87c5ad310cde040e930fcac3", "14af3502eb09fc78eb924711ddd6c9d66b70d9b09be2e9ae71d503b3753595a2a3f0365bf50d259e98"}, 0x3e, 0x1) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r3 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x108) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x20000, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0xc4841, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f00000005c0)='/dev/snd/pcmC#D#p\x00', 0x9cc, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000012}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x5c, r2, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x5c}}, 0x20040080) 08:21:40 executing program 2: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0xfd80}], 0x2}, 0x0) 08:21:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xf00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x50, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffff9c, 0x0, 0x484, &(0x7f0000000080)={0x2f, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e21, 0x1, 'lblc\x00', 0x9, 0x800, 0x5c}, 0x2c) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x80) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:40 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 08:21:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'ip6_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) recvfrom$inet(r0, &(0x7f0000000100)=""/232, 0xe8, 0x1, &(0x7f0000000200)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 294.886434] Unknown ioctl 35108 [ 294.897618] Unknown ioctl 35108 08:21:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x90ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:41 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:41 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x7000000}, 0x0) 08:21:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 08:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x10000000000029, 0x2}, 0x10) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0x20, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x7, 0x4) 08:21:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x40000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:41 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x2b, 0x1f}, 0x10) 08:21:41 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7000000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {}, {0x0, 0x0, 0x2000000}}, {{@in=@multicast1}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x10000, 0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000280)) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x41) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000240)={0x7, r2}) 08:21:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5f541c00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:41 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:42 executing program 5: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:42 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x3}, 0x0) 08:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xb0861d0000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) getsockopt(r0, 0x1, 0x2, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:42 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 08:21:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xff00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:42 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:42 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x5e, 0x8000, 0x4, 0xffff, 0x9, 0x0, 0x1000, {0x0, @in6={{0xa, 0x4e21, 0x401, @ipv4={[], [], @rand_addr=0x8}, 0x80}}, 0xffffffffffffffb5, 0x62f, 0x2, 0x7, 0x800}}, &(0x7f0000000380)=0xb0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000003c0)=r1, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x1000000000000000, 0x0, 0x800000000000}, 0x0, 0x0, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x204, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYRES16], 0x2) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1) r4 = dup3(r3, r2, 0x0) r5 = socket$nl_generic(0xa, 0x3, 0x10) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x101000, 0x0) ioctl$KDSKBMETA(r6, 0x4b63, &(0x7f0000000080)=0x10001) setsockopt$netlink_NETLINK_RX_RING(r5, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) openat$cgroup_procs(r6, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0x3}) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000400)) 08:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffffe4, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:42 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:43 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x7}, 0x0) 08:21:43 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x300, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:43 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0xffffffffffffff81}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket(0x0, 0x6, 0x6fffd449) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000880)={0x0, 0x6, 0x7, [0x2, 0x2, 0xfffffffffffffffd, 0x96, 0x4, 0x1, 0x2]}, &(0x7f00000008c0)=0x16) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000900)=r2, 0x4) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r4 = dup(r0) write$binfmt_aout(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="0b01d6036601000054010000d0908f6e550000003f00000000000000000000000156031cd0cefb566c251627f57cae19eafc37d9487a3ad84b03250f3600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x43d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000003c0)={0x7, 0x3, 0x80000001}) setsockopt$inet6_mreq(r4, 0x29, 0x1d, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0xb}, r5}, 0x14) r6 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast2, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x4e20, 0x4, 0x4e22, 0x1, 0xa, 0x20, 0x80, 0x3f, r5, r6}, {0x800, 0x7, 0x80000001, 0x800, 0x10000, 0x3, 0x6, 0x1}, {0x6, 0x0, 0xfff, 0x4}, 0x9e, 0x6e6bb9, 0x1, 0x0, 0x3, 0x2}, {{@in=@multicast2, 0x4d4, 0x3c}, 0xa, @in=@loopback, 0x34ff, 0x3, 0x1, 0x2, 0x8, 0xffffffffffff72fa, 0xcf}}, 0xe8) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000340)={0x1}) getpeername$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) 08:21:43 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:43 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3f00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:43 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) 08:21:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xe, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 297.422823] 9pnet: Insufficient options for proto=fd 08:21:43 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0xfff, 0x18000) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0x6, 0xfffffffffffffffe, 0x7, 0x80000000, 0x7, 0x7f, 0x1, 0x9, 0x4, 0xffff, 0x240000, 0x8000}) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}}, {{@in=@multicast1, 0x4d6}, 0x0, @in6, 0x0, 0x0, 0x1}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0xfffffffffffffffe}, 0x10) 08:21:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x400000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:44 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:44 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x1000000000000000}, 0x0) 08:21:44 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:44 executing program 2: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 08:21:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x8, 0xb4, 0x1, 0x7f}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0xaa0, 0x6, 0x8001, 0x7, 0x2}, &(0x7f0000000140)=0x14) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0xd) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x1000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 298.135484] 9pnet: Insufficient options for proto=fd 08:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}}, {{@in=@multicast1}, 0x2, @in6}}, 0xe8) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0xdb, 0x29, 0x5}, 0x10) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000380)=@assoc_value={0x0}, &(0x7f00000003c0)=0x8) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f00000000c0)=@in={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000200)="66dceb276c8d6a93115ac8446b67a4f48f765bf06c8a9fdf1a639000b4125ca38bf44026e075fbf0c66a3dc56b8d43807d85138da047957a2e4bcc6767b68e75f8eb5d6e699e36e5d0e4cbd9b51f80bf92a7745628bee696f808e2c89576e07ce850b31d3232d23f833cffdda9c270f3040f706d274c6e09a42029da614e5686d9b20f194d82e4adc15188d60eb884a7e0878bc9a8aa626826fe0b94437cd62a15dd987649c03fd8350b19e33ffd3fe7d6857f1b43202f124832ae9040027b2f34be6267859f7e5fa82a54985ad3fb1c88ea456ebac8ab2f98636e25629c68768fb66589", 0xe4}, {&(0x7f0000000100)="1bcd4bd94820238446571a9aa50999eee2cf297231957a1669ecc2d2ac57a6555683de1ce17b5d00ca8233a5556785a0ef0dd818ee9ea19c033cdf059f699497d906d82e87603ac5a1847d8c4918f352c112fb7fd9d3e2f5ca82359d4263023e3afb754ab0faaa79cf35a4cd258a3a5b999f90573eed21b3c6c3ec447a07bfdb", 0x80}, {&(0x7f0000000300)="f3bdba4d17d7cbeda4e3a4d839581ba9b5b0e2c60cab6ab323a835779e4565996f9d85f86e9182d721bf76a9324ce8a8e06c5a33dedd3f5c", 0x38}], 0x3, &(0x7f0000000400)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x1}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x3}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x200}, @sndrcv={0x30, 0x84, 0x1, {0x4, 0x8, 0x20f, 0x0, 0x2, 0x4, 0x7fffffff, 0x4, r1}}], 0x98, 0x8000}, 0x54) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1cbb, 0x80) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000080)={0x4c64, 0x9, 0x2, 0x100000000}, 0x6) 08:21:44 executing program 0: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x81, 0x189000) write$P9_RFSYNC(r1, &(0x7f0000000280)={0x7, 0x33, 0x1}, 0x7) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000240)) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000002c0)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40840, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000080)=""/233) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000300)=0x3) 08:21:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:44 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x1c4, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}]}}) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0x0, 0x4, {0x3fc8}}, 0x18) write$P9_RREADDIR(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r2, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r2, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r2, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x9) write$P9_RGETATTR(r2, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r2, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:45 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x10000000}, 0x0) 08:21:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @remote}, &(0x7f0000000140)=0x80, 0x80000) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200a10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6400009c203af9002e00000128bd7000fcdbdf25", @ANYRES32=r2, @ANYBLOB="0a00ffffffff050010000a0008000b006e29a0bb08000b000400000008000b00ff0effee08000b00f703000008000b000008000008000b000300000008000b000104000008000b0051000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000010}, 0x40000) r3 = socket$nl_generic(0xa, 0x3, 0x10) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x3, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0xff, 0x2, 0x3, 0xfffffffffffffffa, 0x0, 0x400, 0x50080, 0x8, 0x40, 0x0, 0x8, 0x9, 0x2, 0x3, 0x9, 0x7, 0x2, 0x1ff, 0x5, 0x4, 0x4, 0xfffffffffffffff9, 0x1, 0x4, 0x0, 0x9, 0xeb, 0x1f, 0xfffffffffffffeff, 0x100000001, 0xcf, 0x1000, 0x3, 0x3, 0x0, 0x4, 0x0, 0xfffffffffffffff8, 0x0, @perf_config_ext={0x3, 0x1ff}, 0x28410, 0x8, 0x7, 0x6, 0xe340, 0x7, 0x8000}, r4, 0xf, r0, 0x4) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f00000003c0)=0x9, 0x4) 08:21:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7a000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x56000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r2 = dup(r0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000040)) 08:21:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x500, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:45 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x1c4, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}]}}) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0x0, 0x4, {0x3fc8}}, 0x18) write$P9_RREADDIR(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r2, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r2, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r2, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x9) write$P9_RGETATTR(r2, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r2, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r2, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4c, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:46 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x1000000}, 0x0) 08:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000080)) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0xd3) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 08:21:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6800, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:46 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x1c4, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}]}}) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0x0, 0x4, {0x3fc8}}, 0x18) write$P9_RREADDIR(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r2, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r2, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r2, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x9) write$P9_RGETATTR(r2, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r2, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r2, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$KDSETMODE(r0, 0x4b3a, 0x8) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7a00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x20, 0x40000) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000100)={@mcast2, r1}, 0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xfffffffffffffffa, 0x44, 0x8, 0x100, 0x800}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e20, 0x2, @loopback, 0x6}}, 0x2, 0x3}, 0x90) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:46 executing program 2 (fault-call:14 fault-nth:0): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x2000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) socketpair$inet(0x2, 0xffffffffffffffff, 0x9000, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000300)=0x2) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000100)={0x100000001}, 0x1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r3, 0x4, 0x249, 0x5, 0x0, 0x9}, &(0x7f00000002c0)=0x14) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x1d86b0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 300.136388] FAULT_INJECTION: forcing a failure. [ 300.136388] name failslab, interval 1, probability 0, space 0, times 0 [ 300.170236] CPU: 1 PID: 10580 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 300.177529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.186963] Call Trace: [ 300.189558] dump_stack+0x1c4/0x2b4 [ 300.193197] ? dump_stack_print_info.cold.2+0x52/0x52 [ 300.198385] ? dput.part.26+0x26d/0x790 [ 300.202374] should_fail.cold.4+0xa/0x17 [ 300.206437] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.211543] ? __lock_acquire+0x7ec/0x4ec0 [ 300.215781] ? graph_lock+0x170/0x170 [ 300.219584] ? _parse_integer+0x134/0x180 [ 300.223732] ? graph_lock+0x170/0x170 [ 300.227530] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.233074] ? _kstrtoull+0x188/0x250 [ 300.236886] ? _parse_integer+0x180/0x180 [ 300.241031] ? find_held_lock+0x36/0x1c0 [ 300.245106] ? ___might_sleep+0x1ed/0x300 [ 300.249260] ? check_preemption_disabled+0x48/0x200 [ 300.254298] ? arch_local_save_flags+0x40/0x40 [ 300.258891] __should_failslab+0x124/0x180 [ 300.263130] should_failslab+0x9/0x14 [ 300.266952] kmem_cache_alloc+0x2be/0x730 [ 300.271102] ? lock_downgrade+0x900/0x900 [ 300.275250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.280797] getname_flags+0xd0/0x5a0 [ 300.280815] do_renameat2+0x319/0x1180 [ 300.280825] ? find_held_lock+0x36/0x1c0 [ 300.280840] ? kasan_check_write+0x14/0x20 [ 300.296760] ? wait_for_completion+0x8a0/0x8a0 [ 300.301342] ? user_path_create+0x40/0x40 [ 300.301356] ? __lock_is_held+0xb5/0x140 [ 300.301375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.309547] ? check_preemption_disabled+0x48/0x200 [ 300.320061] ? __sb_end_write+0xd9/0x110 [ 300.324131] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.329697] ? fput+0x130/0x1a0 [ 300.332980] ? do_syscall_64+0x9a/0x820 [ 300.336957] ? do_syscall_64+0x9a/0x820 [ 300.340934] ? lockdep_hardirqs_on+0x421/0x5c0 [ 300.345508] ? trace_hardirqs_on+0xbd/0x310 [ 300.349959] ? __ia32_sys_read+0xb0/0xb0 [ 300.354003] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.359346] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 300.364777] __x64_sys_rename+0x5e/0x80 [ 300.368727] do_syscall_64+0x1b9/0x820 [ 300.372593] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.377956] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.382863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.387680] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.392672] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.397665] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.402663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.407486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.412656] RIP: 0033:0x457569 [ 300.415839] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.434730] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 300.442418] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 300.449664] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 300.456910] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 300.464156] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 300.471405] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:46 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x2}, 0x0) 08:21:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x200000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7, 0x0, 0x0, 0x4, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp, 0x0, 0x0, 0x200, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x400, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e22, 0x3, @empty, 0xffffffff}}, 0x81, 0x1, 0x2, "7ed736cc93cfaf0978cc40fe026765345410ac1bc00307402655597bed65551f65fe28328dd4a54957be438b5ef92bae88fa590dd2c90f5da1a6b0732c347211fb893f76b2c64b95c2e4c3506ce92346"}, 0xd8) 08:21:46 executing program 2 (fault-call:14 fault-nth:1): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cd2f0b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:46 executing program 0 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 300.764621] FAULT_INJECTION: forcing a failure. [ 300.764621] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 300.776447] CPU: 1 PID: 10595 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 300.783712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.793061] Call Trace: [ 300.795668] dump_stack+0x1c4/0x2b4 [ 300.799304] ? dump_stack_print_info.cold.2+0x52/0x52 [ 300.804505] ? __lock_acquire+0x7ec/0x4ec0 [ 300.808750] should_fail.cold.4+0xa/0x17 [ 300.812820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.817933] ? __lock_acquire+0x7ec/0x4ec0 [ 300.822173] ? print_usage_bug+0xc0/0xc0 [ 300.826233] ? rcu_bh_qs+0xc0/0xc0 [ 300.826252] ? mark_held_locks+0x130/0x130 [ 300.826269] ? mark_held_locks+0x130/0x130 [ 300.834017] ? print_usage_bug+0xc0/0xc0 [ 300.842284] ? __lock_acquire+0x7ec/0x4ec0 [ 300.846523] ? graph_lock+0x170/0x170 [ 300.850327] ? dput.part.26+0x26d/0x790 [ 300.854311] ? graph_lock+0x170/0x170 [ 300.858127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.863678] ? should_fail+0x22d/0xd01 [ 300.867575] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.872685] ? __lock_acquire+0x7ec/0x4ec0 [ 300.876933] __alloc_pages_nodemask+0x34b/0xde0 [ 300.881614] ? _parse_integer+0x134/0x180 [ 300.885775] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 300.890794] ? _parse_integer+0x180/0x180 [ 300.894948] ? find_held_lock+0x36/0x1c0 [ 300.899030] ? ___might_sleep+0x1ed/0x300 [ 300.903183] ? trace_hardirqs_off+0xb8/0x310 [ 300.907622] cache_grow_begin+0x91/0x8c0 [ 300.911686] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.917224] ? check_preemption_disabled+0x48/0x200 [ 300.922255] kmem_cache_alloc+0x665/0x730 [ 300.926406] ? lock_downgrade+0x900/0x900 [ 300.930568] getname_flags+0xd0/0x5a0 [ 300.934388] do_renameat2+0x319/0x1180 [ 300.938278] ? find_held_lock+0x36/0x1c0 [ 300.942347] ? kasan_check_write+0x14/0x20 [ 300.946601] ? wait_for_completion+0x8a0/0x8a0 [ 300.951186] ? user_path_create+0x40/0x40 [ 300.955334] ? __lock_is_held+0xb5/0x140 [ 300.959396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.959412] ? check_preemption_disabled+0x48/0x200 [ 300.959430] ? __sb_end_write+0xd9/0x110 [ 300.969940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.969951] ? fput+0x130/0x1a0 [ 300.969967] ? do_syscall_64+0x9a/0x820 [ 300.986771] ? do_syscall_64+0x9a/0x820 [ 300.990754] ? lockdep_hardirqs_on+0x421/0x5c0 [ 300.995348] ? trace_hardirqs_on+0xbd/0x310 [ 300.999671] ? __ia32_sys_read+0xb0/0xb0 [ 301.003730] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.009091] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 301.014539] __x64_sys_rename+0x5e/0x80 [ 301.018500] do_syscall_64+0x1b9/0x820 [ 301.022372] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.027722] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.032632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.037460] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.042465] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.047464] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.052468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.057303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.062477] RIP: 0033:0x457569 [ 301.065656] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.084541] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 301.092232] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 301.099483] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 301.106739] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 08:21:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xa00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000700)=ANY=[@ANYBLOB="ea0f00004b1858056083a7937c13a141c6cc97250ea90551f950c4f46112c47e8b37320b46211d5ce487a92e8c1d14ef75f86c4ac5085bdfe973c9b39444ff171f50b7a7331c7d35d6bda496f00412844142ac8f1101a46eca11776814e9e54826780ea2812d654bfda2904475235641b051e12a4825d574d815bed7a5958899d1534ecc6251d9216ded73691584a9f98881259222ec5c4bb0717cfc7155b76bc31f07b6da8a8f897c62acff66019782daa4b8ce71487dc91b17d8e526452e0eae92b0a13c344e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x24) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0xec, "acd20f381153331a23695aeaaff746b9f62163a221daee4e50abf45997584f4ff1c2c6e14fd003d386e2d18b349394605c1b0734bbaa1c186227e72132772c423b5fc52e74e7c35e0edbc5bfb7e8ed6cb023b0507b2d06580145810063e09888843c8df0e3efbe73dc8325b894e65cc300c62aebf13971c628751b0867d40426649c9d73b9acd9ca7d3e8fcd9203af7dcea44bd458f5d65ac53334b008e04fbaf7685ccbeed29e6082b70ce7a2ab6ec878f40a6ab093868462034f36cc66739c62a933a5f16e31f123647d56f8b3d6689a74bd83ab8c05a7c290acca89b8a38cbd0127d7aad3dfcc7a8d766a"}, &(0x7f0000000100)=0xf4) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x10) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000300)={"c1364d761717133cea8a4e7a24c5a06d904e870ddbf3f911ff03ba524e80401d02bfdb26272bef99014c5d13d79e0bd7b31f3b0fe661107cf75d773e52f3334802555cb4409600b6cb4c98347b9897103a88ddfd4a4318bdd158e94d7fde6f631a3f80d56aa0014c09dea70f8e41356c1051cb7671944c3a4a031bd8c504aeff563c93b04f18e772b983bcaf4001d8ba8648db8ca79d26bc7424636ffab3f447ac3f72a34181f7faa4ebd316d1f2a8069a46523e59cafb58be33e22d31d1f93791e5020dac25e573403e71f96db6997bb41b5269c44d830d369171ee77912209c932ae9f67078c33b505d1e7c1931430be0db338d9c22bdfebf93526f67bdbc04206c2524fcb45aca4ed32efefc05a307b4931a684eae123998c30feee50fa127f8bd7c7838dba45a6c1e87ea2bb6a636369229fd0303a3e1b5c6839a834478c3a51e18402bc764a9d95f304520693bad46c662c97f41a5e87336bdb88ff3266412634af0c82546cf0ec7c53a7698e67aad436a1380cc2dc3a572f5303e7d98ebc60438e3c53e41d3d1e8afdaa51384194b699aeb784d4918fd1e5e39662334fe6c8843b51d5110d80d3323e35b96bdc3519f0965491fc2401fced1897d255889f22ca8ecc49adeb16320f6652e966e09355e5c93898171fe50766e714751e6d80db7fee0638062fe6010eaf7e452426b9470052eb3b5f82090fca041b719bf47f79041b95a4b0fd7d4b7ced33dd1d862e0a7fb75cb97cd932294f363f258cc0a417acdada29db4f548baf957c4449ade9e8264c840639474a4d84782a6d452306ef2723c7a7db0e1ee8d7f6af1257e850636e20f409170bbd49f9556558d254f121e27e44aa3105e9d6ae90a1286dc2b4c9340fa30694536faa3ecbd4e786912786fb5dcc28a6c429986a06f20fbf8cadf87029ef4dd0dc7bb55cdcf1de993a96f16bd945b83aa0de2706617c2e726ed7c4c6ce7e6992e3666a20b11da51d861bb5ee5a3756dd0603a90b7b5acd3e65d96b993c221984f8ee320ad56a01e9bc1d270535e2200bd1a2a1b6a7e8ec30a4b65b67268b2cf57b5349710863728cd0662ceb41d3e336046ddd269cf6c378363bd1b75ee591fc6f316079adbe2d15af6b30182cdd422dbc17a422bdedd8a141dcf68171275d3612e0c57a27269f4e13df97888d53113aef4c1b35450b3e9d0430ba2800e5f286c607530ece728ad29aee13b5bdec3ab6bbf8f039e815c0894d9e22c7666825ceca921ad49ce19b3bed4e8c90b79d5e4b3a155828e1863e4be9fa4926cb8e0766c12191d2123b3a9cf9dd8f7c72e565976d716ebaafe385986da7fd1d02ce6017c1d449038f60ae94b4940c74d251d2d583cfe3bdc81aab0dc85a51562767f933185d32fd0f63335bfac61df9d58f0636c2177930b526a3427d73b6d6bdb9b7b29aa388844d091b3c17"}) 08:21:47 executing program 1 (fault-call:5 fault-nth:0): init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 301.113993] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 301.121245] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7a00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:47 executing program 5: perf_event_open(&(0x7f0000000180)={0xfffffffffffffffe, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 301.166961] FAULT_INJECTION: forcing a failure. [ 301.166961] name failslab, interval 1, probability 0, space 0, times 0 [ 301.206357] CPU: 1 PID: 10614 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #58 [ 301.213642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.213674] Call Trace: [ 301.225613] dump_stack+0x1c4/0x2b4 [ 301.229244] ? dump_stack_print_info.cold.2+0x52/0x52 [ 301.234443] ? print_usage_bug+0xc0/0xc0 [ 301.238522] should_fail.cold.4+0xa/0x17 [ 301.242588] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.242622] ? do_raw_spin_unlock+0xa7/0x2f0 [ 301.242640] ? mark_held_locks+0xc7/0x130 [ 301.256247] ? check_preemption_disabled+0x48/0x200 [ 301.261256] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.266024] ? lockdep_hardirqs_on+0x421/0x5c0 [ 301.270594] ? retint_kernel+0x2d/0x2d [ 301.274468] ? trace_hardirqs_on_caller+0xc0/0x310 [ 301.279384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.284130] ? trace_hardirqs_off+0x310/0x310 [ 301.288634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.293376] ? retint_kernel+0x2d/0x2d [ 301.297255] __should_failslab+0x124/0x180 [ 301.301470] should_failslab+0x9/0x14 [ 301.305251] kmem_cache_alloc+0x2be/0x730 [ 301.309393] jbd2__journal_start+0x1e7/0xa90 [ 301.313786] ? arch_local_save_flags+0x40/0x40 [ 301.318350] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 301.324045] ? __might_sleep+0x95/0x190 [ 301.328010] ? __might_sleep+0xb/0x190 [ 301.331881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.337402] __ext4_journal_start_sb+0x1a5/0x5f0 [ 301.342320] ? ext4_alloc_file_blocks+0x2e1/0xaf0 [ 301.347146] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 301.352839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.358375] ? ext4_ext_index_trans_blocks+0x11f/0x150 [ 301.363632] ? ext4_meta_trans_blocks+0x25f/0x310 [ 301.368460] ext4_alloc_file_blocks+0x2e1/0xaf0 [ 301.373114] ? lock_release+0x970/0x970 [ 301.377074] ? arch_local_save_flags+0x40/0x40 [ 301.381642] ? ext4_extent_block_csum_set+0x4a0/0x4a0 [ 301.386815] ? retint_kernel+0x2d/0x2d [ 301.390687] ? ext4_fallocate+0xa11/0x2300 [ 301.394919] ext4_fallocate+0xa33/0x2300 [ 301.398961] ? print_usage_bug+0xc0/0xc0 [ 301.403001] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.408521] ? graph_lock+0x170/0x170 [ 301.412309] ? ext4_insert_range+0x1410/0x1410 [ 301.416894] ? graph_lock+0x170/0x170 [ 301.420679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.426205] ? check_preemption_disabled+0x48/0x200 [ 301.431204] ? check_preemption_disabled+0x48/0x200 [ 301.436208] ? __lock_is_held+0xb5/0x140 [ 301.440261] ? rcu_read_lock_sched_held+0x108/0x120 [ 301.445261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.450790] ? __sb_start_write+0x1b2/0x370 [ 301.455108] ? ext4_insert_range+0x1410/0x1410 [ 301.459674] vfs_fallocate+0x4b4/0x940 [ 301.463566] ioctl_preallocate+0x1e8/0x300 [ 301.467785] ? ioctl_file_clone+0x120/0x120 [ 301.472093] ? do_vfs_ioctl+0x163/0x1720 [ 301.476134] ? do_vfs_ioctl+0x11a4/0x1720 [ 301.480281] do_vfs_ioctl+0x1435/0x1720 [ 301.484243] ? __lock_is_held+0xb5/0x140 [ 301.488290] ? ioctl_preallocate+0x300/0x300 [ 301.492681] ? smk_curacc+0x7f/0xa0 [ 301.496292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.501844] ? smack_file_ioctl+0x210/0x3c0 [ 301.506147] ? fget_raw+0x20/0x20 [ 301.509581] ? smack_file_lock+0x2e0/0x2e0 [ 301.514304] ? fput+0x130/0x1a0 [ 301.517565] ? do_syscall_64+0x9a/0x820 [ 301.521518] ? do_syscall_64+0x9a/0x820 [ 301.525476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.530994] ? security_file_ioctl+0x94/0xc0 [ 301.535386] ksys_ioctl+0xa9/0xd0 [ 301.538822] __x64_sys_ioctl+0x73/0xb0 [ 301.542690] do_syscall_64+0x1b9/0x820 [ 301.546559] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.551903] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.556814] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.561642] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.566727] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.571727] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.576728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.581559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.586729] RIP: 0033:0x457569 [ 301.589905] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.608784] RSP: 002b:00007fcff7703c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.616474] RAX: ffffffffffffffda RBX: 00007fcff7703c90 RCX: 0000000000457569 [ 301.623723] RDX: 0000000020000000 RSI: 000000004030582a RDI: 0000000000000004 [ 301.630973] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.638225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcff77046d4 [ 301.645474] R13: 00000000004c05b8 R14: 00000000004d07b0 R15: 0000000000000005 08:21:48 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x10000000000000}, 0x0) 08:21:48 executing program 1 (fault-call:5 fault-nth:1): init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:48 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x100000000, 0x80) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:48 executing program 2 (fault-call:14 fault-nth:2): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x600, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5451, &(0x7f0000000000)=0x801) 08:21:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1, 0x0, 0xff}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) fcntl$setpipe(r0, 0x407, 0x1) [ 301.997820] FAULT_INJECTION: forcing a failure. [ 301.997820] name failslab, interval 1, probability 0, space 0, times 0 [ 302.010577] CPU: 1 PID: 10637 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 302.017950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.027299] Call Trace: [ 302.029897] dump_stack+0x1c4/0x2b4 [ 302.033537] ? dump_stack_print_info.cold.2+0x52/0x52 [ 302.038823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.044363] ? security_inode_permission+0xd2/0x100 [ 302.049388] should_fail.cold.4+0xa/0x17 [ 302.050966] FAULT_INJECTION: forcing a failure. [ 302.050966] name failslab, interval 1, probability 0, space 0, times 0 [ 302.053455] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.053471] ? pick_link+0xaf0/0xaf0 [ 302.053491] ? graph_lock+0x170/0x170 [ 302.053513] ? walk_component+0x25c0/0x25c0 [ 302.053526] ? dput.part.26+0x26d/0x790 [ 302.053544] ? find_held_lock+0x36/0x1c0 [ 302.053578] ? ___might_sleep+0x1ed/0x300 [ 302.053593] ? arch_local_save_flags+0x40/0x40 [ 302.098486] ? filename_parentat.isra.56+0x424/0x570 [ 302.103593] ? getname+0x20/0x20 [ 302.106963] __should_failslab+0x124/0x180 [ 302.111202] should_failslab+0x9/0x14 [ 302.115012] kmem_cache_alloc+0x2be/0x730 [ 302.119182] getname_flags+0xd0/0x5a0 [ 302.122992] do_renameat2+0x37d/0x1180 [ 302.126878] ? find_held_lock+0x36/0x1c0 [ 302.130942] ? kasan_check_write+0x14/0x20 [ 302.135187] ? wait_for_completion+0x8a0/0x8a0 [ 302.139765] ? user_path_create+0x40/0x40 [ 302.143907] ? __lock_is_held+0xb5/0x140 [ 302.147969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.153615] ? check_preemption_disabled+0x48/0x200 [ 302.158640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.164173] ? fput+0x130/0x1a0 [ 302.167464] ? do_syscall_64+0x9a/0x820 [ 302.171439] ? do_syscall_64+0x9a/0x820 [ 302.175433] ? trace_hardirqs_on+0xbd/0x310 [ 302.179748] ? __ia32_sys_read+0xb0/0xb0 [ 302.183818] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.189178] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 302.194630] __x64_sys_rename+0x5e/0x80 [ 302.198625] do_syscall_64+0x1b9/0x820 [ 302.202519] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.207897] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.212828] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.217673] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.222687] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.227706] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.232728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.237573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.242758] RIP: 0033:0x457569 [ 302.245950] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.264850] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 302.272556] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 302.279825] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 302.287098] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 302.294363] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 302.301626] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 [ 302.309019] CPU: 0 PID: 10638 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #58 [ 302.316290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.316299] Call Trace: [ 302.328240] dump_stack+0x1c4/0x2b4 [ 302.331884] ? dump_stack_print_info.cold.2+0x52/0x52 [ 302.337084] should_fail.cold.4+0xa/0x17 [ 302.341156] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.346730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.351474] ? trace_hardirqs_off+0x310/0x310 [ 302.355971] ? graph_lock+0x170/0x170 [ 302.359757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.364499] ? retint_kernel+0x2d/0x2d [ 302.368374] ? __lock_is_held+0xb5/0x140 [ 302.372430] ? ___might_sleep+0x1ed/0x300 [ 302.376563] ? arch_local_save_flags+0x40/0x40 [ 302.381135] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.386658] ? perf_trace_ext4__map_blocks_enter+0x508/0x800 [ 302.392455] __should_failslab+0x124/0x180 [ 302.396673] should_failslab+0x9/0x14 [ 302.400456] __kmalloc+0x2d4/0x760 [ 302.403993] ? ext4_find_extent+0x757/0x9b0 [ 302.408303] ext4_find_extent+0x757/0x9b0 [ 302.412441] ext4_ext_map_blocks+0x2ad/0x6330 [ 302.416916] ? print_usage_bug+0xc0/0xc0 [ 302.420979] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 302.425998] ? find_held_lock+0x36/0x1c0 [ 302.430044] ? graph_lock+0x170/0x170 [ 302.433827] ? graph_lock+0x170/0x170 [ 302.437617] ? ext4_es_lookup_extent+0x446/0xde0 [ 302.442359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.447878] ? check_preemption_disabled+0x48/0x200 [ 302.452880] ? check_preemption_disabled+0x48/0x200 [ 302.457886] ? lock_acquire+0x1ed/0x520 [ 302.461841] ? ext4_map_blocks+0x487/0x1b50 [ 302.466150] ? lock_release+0x970/0x970 [ 302.470111] ? arch_local_save_flags+0x40/0x40 [ 302.474676] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.480194] ? ext4_es_lookup_extent+0x499/0xde0 [ 302.484944] ? down_read+0xb0/0x1d0 [ 302.488559] ? ext4_map_blocks+0x487/0x1b50 [ 302.493565] ? __down_interruptible+0x700/0x700 [ 302.498222] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 302.503918] ext4_map_blocks+0xe35/0x1b50 [ 302.508151] ? ext4_issue_zeroout+0x190/0x190 [ 302.512630] ? ext4_ext_index_trans_blocks+0x11f/0x150 [ 302.517890] ? ext4_meta_trans_blocks+0x25f/0x310 [ 302.522732] ext4_alloc_file_blocks+0x319/0xaf0 [ 302.527383] ? lock_release+0x970/0x970 [ 302.531338] ? arch_local_save_flags+0x40/0x40 [ 302.535917] ? ext4_extent_block_csum_set+0x4a0/0x4a0 [ 302.541133] ? down_write+0x8a/0x130 [ 302.544830] ? ext4_fallocate+0x31b/0x2300 [ 302.549056] ? down_read+0x1d0/0x1d0 [ 302.552777] ext4_fallocate+0xa33/0x2300 [ 302.556823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.561566] ? ext4_insert_range+0x1410/0x1410 [ 302.566131] ? retint_kernel+0x2d/0x2d [ 302.570005] ? graph_lock+0x170/0x170 [ 302.573788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.579310] ? check_preemption_disabled+0x48/0x200 [ 302.584334] ? __lock_is_held+0xb5/0x140 [ 302.588385] ? rcu_read_lock_sched_held+0x108/0x120 [ 302.593384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.598907] ? __sb_start_write+0x1b2/0x370 [ 302.603215] ? ext4_insert_range+0x1410/0x1410 [ 302.607783] vfs_fallocate+0x4b4/0x940 [ 302.611663] ioctl_preallocate+0x1e8/0x300 [ 302.615881] ? ioctl_file_clone+0x120/0x120 [ 302.620191] ? smack_privileged+0xd0/0xd0 [ 302.624328] do_vfs_ioctl+0x1435/0x1720 [ 302.628283] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.633024] ? ioctl_preallocate+0x300/0x300 [ 302.637418] ? smk_curacc+0x7f/0xa0 [ 302.641030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.646561] ? smack_file_ioctl+0x210/0x3c0 [ 302.650882] ? fget_raw+0x20/0x20 [ 302.654322] ? smack_file_lock+0x2e0/0x2e0 [ 302.658547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.663296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.668821] ? security_file_ioctl+0x94/0xc0 [ 302.673219] ksys_ioctl+0xa9/0xd0 [ 302.676661] __x64_sys_ioctl+0x73/0xb0 [ 302.680534] do_syscall_64+0x1b9/0x820 [ 302.684408] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.689760] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.694672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.699500] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.704513] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.709516] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.714523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.719544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.724717] RIP: 0033:0x457569 [ 302.727905] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:21:48 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x700000000000000}, 0x0) 08:21:48 executing program 2 (fault-call:14 fault-nth:3): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') [ 302.746790] RSP: 002b:00007fcff7703c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.754485] RAX: ffffffffffffffda RBX: 00007fcff7703c90 RCX: 0000000000457569 [ 302.761741] RDX: 0000000020000000 RSI: 000000004030582a RDI: 0000000000000004 [ 302.769003] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 302.776255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcff77046d4 [ 302.783514] R13: 00000000004c05b8 R14: 00000000004d07b0 R15: 0000000000000005 08:21:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xffffffc0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, &(0x7f0000000000)=0x801) [ 302.910887] FAULT_INJECTION: forcing a failure. [ 302.910887] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 302.922734] CPU: 1 PID: 10656 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 302.929995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.939334] Call Trace: [ 302.941922] dump_stack+0x1c4/0x2b4 [ 302.945538] ? dump_stack_print_info.cold.2+0x52/0x52 [ 302.950718] ? smk_tskacc+0x3dd/0x520 [ 302.954512] should_fail.cold.4+0xa/0x17 [ 302.958563] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.963652] ? map_id_up+0x193/0x3d0 [ 302.967351] ? make_kprojid+0x30/0x30 [ 302.971141] ? find_held_lock+0x36/0x1c0 [ 302.975196] ? mark_held_locks+0x130/0x130 [ 302.979416] ? smack_inode_permission+0x2bc/0x3b0 [ 302.984252] ? smack_file_ioctl+0x3c0/0x3c0 [ 302.988561] ? __sanitizer_cov_trace_cmp8+0x9/0x20 [ 302.993479] ? security_capable+0x99/0xc0 [ 302.997617] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 303.002712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.008239] ? security_inode_permission+0xd2/0x100 [ 303.013246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.018773] ? should_fail+0x22d/0xd01 [ 303.022648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.027738] ? pick_link+0xaf0/0xaf0 [ 303.031450] __alloc_pages_nodemask+0x34b/0xde0 [ 303.036108] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 303.041109] ? dput.part.26+0x26d/0x790 [ 303.045076] ? find_held_lock+0x36/0x1c0 [ 303.049136] ? ___might_sleep+0x1ed/0x300 [ 303.053271] ? trace_hardirqs_off+0xb8/0x310 [ 303.057670] cache_grow_begin+0x91/0x8c0 [ 303.061719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.067247] ? check_preemption_disabled+0x48/0x200 [ 303.072257] kmem_cache_alloc+0x665/0x730 [ 303.076410] getname_flags+0xd0/0x5a0 [ 303.080204] do_renameat2+0x37d/0x1180 [ 303.084074] ? find_held_lock+0x36/0x1c0 [ 303.088125] ? kasan_check_write+0x14/0x20 [ 303.092353] ? wait_for_completion+0x8a0/0x8a0 [ 303.096927] ? user_path_create+0x40/0x40 [ 303.101063] ? __lock_is_held+0xb5/0x140 [ 303.105124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.110660] ? check_preemption_disabled+0x48/0x200 [ 303.115779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.121303] ? fput+0x130/0x1a0 [ 303.124570] ? do_syscall_64+0x9a/0x820 [ 303.128530] ? do_syscall_64+0x9a/0x820 [ 303.132497] ? trace_hardirqs_on+0xbd/0x310 [ 303.136808] ? __ia32_sys_read+0xb0/0xb0 [ 303.140852] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.146203] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 303.151754] __x64_sys_rename+0x5e/0x80 [ 303.155716] do_syscall_64+0x1b9/0x820 [ 303.159591] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.164941] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.169859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.174690] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.179693] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.184698] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.189700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.194531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.199704] RIP: 0033:0x457569 [ 303.202883] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.221774] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 303.229483] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 303.236735] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 303.243988] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.251237] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 08:21:49 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000000c0)={0x4, 0x2, 'client1\x00', 0x2, "afe45d23e6bc25ff", "e9d069d6f0303e28bc5e022c26f8c6f2b1bddfdd92ecd0920c012152e0f9301d", 0x80000000, 0xc5}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2400, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10000000002000, 0x0) setns(r2, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:49 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 303.258499] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x2000000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:49 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x410200, 0x0) r1 = getuid() r2 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90, 0xffffffffffffffda, 0x1, {0x4, 0x0, 0x0, 0x9df, 0x1, 0x3, {0x5, 0x6, 0x5, 0x10000, 0x9, 0x1, 0x3, 0x8, 0x1ff, 0x16, 0x7ff, r1, r2, 0x100000000}}}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r3 = socket$nl_generic(0xa, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000200)={{0x9, 0x7}, 'port0\x00', 0x40, 0x1021, 0xfff, 0xfffffffffffffff8, 0x4, 0x8fa, 0x1, 0x0, 0x2, 0x7}) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xc0ffffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:49 executing program 2 (fault-call:14 fault-nth:4): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4c00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x3, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast1}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 303.588220] FAULT_INJECTION: forcing a failure. [ 303.588220] name failslab, interval 1, probability 0, space 0, times 0 [ 303.607082] CPU: 1 PID: 10690 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 303.614381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.623733] Call Trace: [ 303.626334] dump_stack+0x1c4/0x2b4 [ 303.629977] ? dump_stack_print_info.cold.2+0x52/0x52 [ 303.635175] ? print_usage_bug+0xc0/0xc0 [ 303.639259] should_fail.cold.4+0xa/0x17 [ 303.643336] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.648443] ? smack_privileged+0xd0/0xd0 [ 303.652612] ? walk_component+0x3fe/0x25c0 [ 303.656884] ? graph_lock+0x170/0x170 [ 303.660693] ? graph_lock+0x170/0x170 [ 303.664501] ? mark_held_locks+0x130/0x130 [ 303.668746] ? find_held_lock+0x36/0x1c0 [ 303.672819] ? __lock_is_held+0xb5/0x140 [ 303.676906] ? ___might_sleep+0x1ed/0x300 [ 303.681064] ? arch_local_save_flags+0x40/0x40 [ 303.685686] __should_failslab+0x124/0x180 [ 303.689930] should_failslab+0x9/0x14 [ 303.693750] kmem_cache_alloc+0x2be/0x730 [ 303.697914] __d_alloc+0xc8/0xcc0 [ 303.701382] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 303.706400] ? d_alloc_parallel+0x1f40/0x1f40 [ 303.710899] ? d_lookup+0x269/0x340 [ 303.714520] ? d_lookup+0x269/0x340 [ 303.718129] ? lockdep_hardirqs_on+0x421/0x5c0 [ 303.722700] ? lock_rename+0x236/0x290 [ 303.726567] ? lookup_dcache+0x22/0x140 [ 303.730528] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 303.735968] ? lock_release+0x970/0x970 [ 303.739923] ? arch_local_save_flags+0x40/0x40 [ 303.744487] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 303.749484] d_alloc+0x96/0x380 [ 303.752741] ? __d_lookup+0x9e0/0x9e0 [ 303.756520] ? __d_alloc+0xcc0/0xcc0 [ 303.760212] ? lock_rename+0x236/0x290 [ 303.764082] __lookup_hash+0xd9/0x190 [ 303.767889] do_renameat2+0x6c1/0x1180 [ 303.771763] ? user_path_create+0x40/0x40 [ 303.775895] ? __lock_is_held+0xb5/0x140 [ 303.779946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.785467] ? check_preemption_disabled+0x48/0x200 [ 303.790472] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.795994] ? do_syscall_64+0x9a/0x820 [ 303.799948] ? do_syscall_64+0x9a/0x820 [ 303.803902] ? trace_hardirqs_on+0xbd/0x310 [ 303.808206] ? __ia32_sys_read+0xb0/0xb0 [ 303.812250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.817595] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 303.823029] __x64_sys_rename+0x5e/0x80 [ 303.826985] do_syscall_64+0x1b9/0x820 [ 303.830858] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.836204] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.841114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.845941] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.850941] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.855948] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.860949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.865788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.870956] RIP: 0033:0x457569 08:21:50 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x100000}, 0x0) 08:21:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000040)={0x4, {{0xa, 0x4e20, 0x0, @remote, 0x8001}}}, 0x88) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0xeacf, 0x2}, 0x10) 08:21:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, &(0x7f0000000000)=0x801) 08:21:50 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5460, &(0x7f0000000000)=0x801) 08:21:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xf00, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 303.874130] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.893011] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 303.900703] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 303.907951] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 303.915198] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.922444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 303.929691] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:50 executing program 2 (fault-call:14 fault-nth:5): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5f541c0000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xfb) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000000c0)=""/180) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000040)={0x1c2, 0x0, 0x29, 0x2}, 0x10) 08:21:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, &(0x7f0000000000)=0x801) 08:21:50 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, &(0x7f0000000000)=0x801) [ 304.106603] FAULT_INJECTION: forcing a failure. [ 304.106603] name failslab, interval 1, probability 0, space 0, times 0 [ 304.145766] CPU: 1 PID: 10711 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 304.153070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.162411] Call Trace: [ 304.164987] dump_stack+0x1c4/0x2b4 [ 304.168600] ? dump_stack_print_info.cold.2+0x52/0x52 [ 304.173774] ? kernel_text_address+0x79/0xf0 [ 304.178163] ? __kernel_text_address+0xd/0x40 [ 304.182645] should_fail.cold.4+0xa/0x17 [ 304.186687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.191772] ? __lock_acquire+0x7ec/0x4ec0 [ 304.195988] ? graph_lock+0x170/0x170 [ 304.199768] ? save_stack+0x43/0xd0 [ 304.203374] ? kasan_kmalloc+0xc7/0xe0 [ 304.207242] ? graph_lock+0x170/0x170 [ 304.211021] ? d_alloc+0x96/0x380 [ 304.214457] ? graph_lock+0x170/0x170 [ 304.218247] ? find_held_lock+0x36/0x1c0 [ 304.222293] ? __lock_is_held+0xb5/0x140 [ 304.226348] ? ___might_sleep+0x1ed/0x300 [ 304.230475] ? v9fs_fid_find+0x24b/0x2f0 [ 304.234516] ? arch_local_save_flags+0x40/0x40 [ 304.239078] ? lock_downgrade+0x900/0x900 [ 304.243214] __should_failslab+0x124/0x180 [ 304.247436] should_failslab+0x9/0x14 [ 304.251218] kmem_cache_alloc_trace+0x2d7/0x750 [ 304.255871] ? do_raw_spin_lock+0xc1/0x200 [ 304.260096] p9_fid_create+0x49/0x2b0 [ 304.263881] p9_client_walk+0x124/0xb30 [ 304.267836] ? match_held_lock+0x291/0x8d0 [ 304.272073] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 304.277682] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 304.282683] ? d_alloc+0x28b/0x380 [ 304.286211] ? lock_downgrade+0x85c/0x900 [ 304.290342] ? v9fs_fid_add+0x240/0x240 [ 304.294302] ? kasan_check_read+0x11/0x20 [ 304.298436] ? do_raw_spin_unlock+0xa7/0x2f0 [ 304.302831] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 304.307410] v9fs_vfs_lookup+0x1f7/0x4a0 [ 304.311457] ? v9fs_vfs_lookup+0x1f7/0x4a0 [ 304.315691] ? d_alloc+0x290/0x380 [ 304.319217] ? v9fs_vfs_create+0x130/0x130 [ 304.323429] ? lock_rename+0x236/0x290 [ 304.327325] __lookup_hash+0x12e/0x190 [ 304.331200] do_renameat2+0x6c1/0x1180 [ 304.335081] ? user_path_create+0x40/0x40 [ 304.339222] ? __lock_is_held+0xb5/0x140 [ 304.343277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.349013] ? check_preemption_disabled+0x48/0x200 [ 304.354039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.359558] ? do_syscall_64+0x9a/0x820 [ 304.363520] ? do_syscall_64+0x9a/0x820 [ 304.367478] ? trace_hardirqs_on+0xbd/0x310 [ 304.371782] ? __ia32_sys_read+0xb0/0xb0 [ 304.375833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.381178] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 304.386613] __x64_sys_rename+0x5e/0x80 [ 304.390585] do_syscall_64+0x1b9/0x820 [ 304.394461] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.399816] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.404727] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.409561] ? trace_hardirqs_on_caller+0x310/0x310 [ 304.414582] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 304.419582] ? prepare_exit_to_usermode+0x291/0x3b0 [ 304.424584] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.429414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.434579] RIP: 0033:0x457569 [ 304.437754] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:21:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xd0ffffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 304.456632] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 304.464323] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 304.471575] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 304.478844] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 304.486099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 304.493351] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:50 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5421, &(0x7f0000000000)=0x801) 08:21:50 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x10000000000000}, 0x0) 08:21:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0189436, &(0x7f0000000000)=0x801) 08:21:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x80ffffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:50 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'\x00', r2}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) r6 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x2, 0x220000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xfffffffffffffebf) getsockname$packet(r0, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d40)=0x14) getsockname$packet(r0, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000e00)={@loopback, 0x0}, &(0x7f0000000e40)=0x14) getpeername(r0, &(0x7f0000000e80)=@can={0x1d, 0x0}, &(0x7f0000000f00)=0x80) getpeername(r0, &(0x7f0000000f40)=@hci={0x1f, 0x0}, &(0x7f0000002100)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002140)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000002240)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002280)={'veth1_to_team\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f00000022c0)={@local, 0x0}, &(0x7f0000002300)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002340)={@multicast1, @multicast1, 0x0}, &(0x7f0000002380)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000003d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003d80)=0x14, 0x80800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003dc0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000003f00)={@dev, 0x0}, &(0x7f0000003f40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000004240)={{{@in=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000004340)=0x30f) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@ipv4={[], [], @remote}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000004480)=0xe8) getpeername(r0, &(0x7f00000044c0)=@hci={0x1f, 0x0}, &(0x7f0000004540)=0x80) socket$inet_udp(0x2, 0x2, 0x0) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r23, 0x0, 0x8, &(0x7f0000004580)={0x0}, &(0x7f00000045c0)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000004c40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000004c00)={&(0x7f00000023c0)=ANY=[@ANYBLOB="ec050000", @ANYRES16=r1, @ANYBLOB="21022abd7000ffdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="c401020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004002414000008000600", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff0f000008000600", @ANYRES32=r7, @ANYBLOB="3c000100240001006c625f74785f306574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006c626657eaf36d6574686f64000000040000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670e0000004000010024000100701ef90415af6df8dcc7ef89a24469dd8072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000800000008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="c00002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000140004000000081b0100000015000801000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="0708eeaf", @ANYRES32=r12, @ANYBLOB="500002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r13, @ANYBLOB="bc00020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="087fff00230000e3080000e0edf4bd4e83dad62d89011f7cf992e601f5565bbf1106419cc791e0f476e6c2e47e7b2a16ef5c5bb333d7ab28c05f42bf97be39e7d08d64000000663188d38a1d93", @ANYRES32=r16, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000400000008000100", @ANYRES32=r17, @ANYBLOB="8000020040000100240001006c625f706f72745f737461747300000000000000000000000002000000000000080003000b000000080004000080000008000600", @ANYRES32=r18, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="08000100", @ANYRES32=r20, @ANYBLOB="400002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="08000100", @ANYRES32=r22, @ANYBLOB="ec000200380001656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000200000000000000240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040003000000080007000000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400030000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400000000000000000000000000", @ANYRES32=r24], 0x5cc}, 0x1, 0x0, 0x0, 0x1}, 0x844) r25 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6cc, 0x6000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xef3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000480)=@sack_info={r26, 0x101, 0x16f3}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r25, 0x84, 0x22, &(0x7f0000000100)={0x96, 0x9, 0x1, 0xbf09}, 0x175) setsockopt$inet6_opts(r25, 0x29, 0xaa0e09f0aa2462b0, &(0x7f00000003c0)=ANY=[], 0x0) 08:21:50 executing program 2 (fault-call:14 fault-nth:6): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:50 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5450, &(0x7f0000000000)=0x801) 08:21:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x50000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:51 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0189436, &(0x7f0000000000)=0x801) [ 304.922778] FAULT_INJECTION: forcing a failure. [ 304.922778] name failslab, interval 1, probability 0, space 0, times 0 [ 304.934302] CPU: 1 PID: 10747 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 304.941567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.950917] Call Trace: [ 304.953514] dump_stack+0x1c4/0x2b4 [ 304.957155] ? dump_stack_print_info.cold.2+0x52/0x52 [ 304.962356] should_fail.cold.4+0xa/0x17 [ 304.966428] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.971536] ? mark_held_locks+0x130/0x130 [ 304.975785] ? print_usage_bug+0xc0/0xc0 [ 304.979849] ? ima_match_policy+0x848/0x1560 [ 304.984270] ? print_usage_bug+0xc0/0xc0 [ 304.988330] ? __lock_acquire+0x7ec/0x4ec0 [ 304.992553] ? graph_lock+0x170/0x170 [ 304.996340] ? graph_lock+0x170/0x170 [ 305.000135] ? graph_lock+0x170/0x170 [ 305.003931] ? print_usage_bug+0xc0/0xc0 [ 305.007983] __should_failslab+0x124/0x180 [ 305.012205] should_failslab+0x9/0x14 [ 305.015990] kmem_cache_alloc+0x47/0x730 [ 305.020044] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 305.025747] radix_tree_extend+0x294/0x660 [ 305.029971] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 305.035842] ? kernel_text_address+0x79/0xf0 [ 305.040234] ? __kernel_text_address+0xd/0x40 [ 305.044717] ? unwind_get_return_address+0x61/0xa0 [ 305.049638] ? __save_stack_trace+0x8d/0xf0 [ 305.053946] idr_get_free+0x83d/0xec0 [ 305.057754] ? ida_pre_get+0x130/0x130 [ 305.061623] ? do_renameat2+0x6c1/0x1180 [ 305.065667] ? do_syscall_64+0x1b9/0x820 [ 305.069718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.075069] ? graph_lock+0x170/0x170 [ 305.078858] ? find_held_lock+0x36/0x1c0 [ 305.082908] ? graph_lock+0x170/0x170 [ 305.086695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.092238] ? check_preemption_disabled+0x48/0x200 [ 305.097252] ? check_preemption_disabled+0x48/0x200 [ 305.102262] ? lock_acquire+0x1ed/0x520 [ 305.106222] ? p9_fid_create+0x1bc/0x2b0 [ 305.110275] idr_alloc_u32+0x201/0x3f0 [ 305.114583] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 305.119408] ? trace_hardirqs_on+0x310/0x310 [ 305.123801] ? kasan_check_write+0x14/0x20 [ 305.128020] ? do_raw_spin_lock+0xc1/0x200 [ 305.132252] p9_fid_create+0x1d7/0x2b0 [ 305.136130] p9_client_walk+0x124/0xb30 [ 305.140089] ? match_held_lock+0x291/0x8d0 [ 305.144316] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 305.149930] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 305.154931] ? d_alloc+0x28b/0x380 [ 305.158456] ? lock_downgrade+0x85c/0x900 [ 305.162592] ? v9fs_fid_add+0x240/0x240 [ 305.166554] ? kasan_check_read+0x11/0x20 [ 305.170688] ? do_raw_spin_unlock+0xa7/0x2f0 [ 305.175078] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 305.179646] v9fs_vfs_lookup+0x1f7/0x4a0 [ 305.183692] ? v9fs_vfs_lookup+0x1f7/0x4a0 [ 305.187910] ? d_alloc+0x290/0x380 [ 305.191438] ? v9fs_vfs_create+0x130/0x130 [ 305.195655] ? lock_rename+0x236/0x290 [ 305.199532] __lookup_hash+0x12e/0x190 [ 305.203414] do_renameat2+0x6c1/0x1180 [ 305.207296] ? user_path_create+0x40/0x40 [ 305.211426] ? __lock_is_held+0xb5/0x140 [ 305.215476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.220999] ? check_preemption_disabled+0x48/0x200 [ 305.226010] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.231536] ? do_syscall_64+0x9a/0x820 [ 305.235496] ? do_syscall_64+0x9a/0x820 [ 305.239456] ? trace_hardirqs_on+0xbd/0x310 [ 305.243761] ? __ia32_sys_read+0xb0/0xb0 [ 305.247816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.253163] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 305.258596] __x64_sys_rename+0x5e/0x80 [ 305.262554] do_syscall_64+0x1b9/0x820 [ 305.266423] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 305.271766] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.276674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.281496] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.286498] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 305.291496] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.296580] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.301406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.306578] RIP: 0033:0x457569 [ 305.309756] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.328634] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 305.336323] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 305.343574] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 305.350825] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.358073] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 305.365322] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x801) 08:21:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7e, 0x10100) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000080)) 08:21:51 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5451, &(0x7f0000000000)=0x801) 08:21:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x70, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:51 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x1000000}, 0x0) 08:21:51 executing program 2 (fault-call:14 fault-nth:7): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, {}, {0x0, 0x7fff}, 0x0, 0x0, 0x4}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:21:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000000)=0x801) 08:21:51 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x801) 08:21:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xb0ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:51 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, &(0x7f0000000000)=0x801) [ 305.782651] FAULT_INJECTION: forcing a failure. [ 305.782651] name failslab, interval 1, probability 0, space 0, times 0 [ 305.794176] CPU: 1 PID: 10787 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 305.801452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.810806] Call Trace: [ 305.813426] dump_stack+0x1c4/0x2b4 [ 305.817064] ? dump_stack_print_info.cold.2+0x52/0x52 [ 305.822279] should_fail.cold.4+0xa/0x17 [ 305.826356] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.831466] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.837017] ? trace_hardirqs_on+0x310/0x310 [ 305.841428] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.846966] ? get_page_from_freelist+0x488b/0x5340 [ 305.851979] ? graph_lock+0x170/0x170 [ 305.855788] ? print_usage_bug+0xc0/0xc0 [ 305.859847] ? print_usage_bug+0xc0/0xc0 [ 305.863906] ? print_usage_bug+0xc0/0xc0 [ 305.867966] ? graph_lock+0x170/0x170 [ 305.871854] ? print_usage_bug+0xc0/0xc0 [ 305.875928] __should_failslab+0x124/0x180 08:21:52 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'team_slave_1\x00', 0xf0}) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x0) r2 = msgget(0x1, 0x100) msgctl$IPC_RMID(r2, 0x0) 08:21:52 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40049409, &(0x7f0000000000)=0x801) [ 305.880159] should_failslab+0x9/0x14 [ 305.883962] kmem_cache_alloc+0x47/0x730 [ 305.888016] ? print_usage_bug+0xc0/0xc0 [ 305.892070] ? lock_downgrade+0x900/0x900 [ 305.896220] ? check_preemption_disabled+0x48/0x200 [ 305.901243] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 305.906958] radix_tree_extend+0x294/0x660 [ 305.911204] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 305.917095] ? __kernel_text_address+0xd/0x40 [ 305.921598] ? unwind_get_return_address+0x61/0xa0 [ 305.926536] idr_get_free+0x83d/0xec0 [ 305.930339] ? save_stack+0xa9/0xd0 [ 305.933969] ? ida_pre_get+0x130/0x130 [ 305.937868] ? p9_client_walk+0x124/0xb30 [ 305.942010] ? __lookup_hash+0x12e/0x190 [ 305.946067] ? do_renameat2+0x6c1/0x1180 [ 305.950119] ? __x64_sys_rename+0x5e/0x80 [ 305.954277] ? do_syscall_64+0x1b9/0x820 [ 305.958340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.963707] ? print_usage_bug+0xc0/0xc0 [ 305.967764] ? __lock_acquire+0x7ec/0x4ec0 [ 305.967784] ? graph_lock+0x170/0x170 [ 305.975786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.975804] ? check_preemption_disabled+0x48/0x200 [ 305.975819] ? check_preemption_disabled+0x48/0x200 [ 305.975862] idr_alloc_u32+0x201/0x3f0 [ 305.995248] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 306.000091] ? p9_idpool_get+0x23/0x90 [ 306.003984] idr_alloc+0x111/0x1b0 [ 306.007522] ? idr_alloc_u32+0x3f0/0x3f0 [ 306.011597] ? do_raw_spin_lock+0xc1/0x200 [ 306.015832] p9_idpool_get+0x3d/0x90 [ 306.019543] p9_client_prepare_req.part.8+0xec/0xc30 [ 306.024641] ? delete_node+0x30e/0xd20 [ 306.028536] ? unwind_get_return_address+0x61/0xa0 08:21:52 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2, &(0x7f0000000000)=0x801) [ 306.033467] ? p9_free_req.isra.7+0x140/0x140 [ 306.037969] ? idr_destroy+0x1c0/0x1c0 [ 306.041859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.047393] ? replace_slot+0x151/0x520 [ 306.051376] p9_client_rpc+0x1c2/0x1480 [ 306.055351] ? radix_tree_descend+0x2e0/0x2e0 [ 306.059848] ? p9_client_prepare_req.part.8+0xc30/0xc30 [ 306.065222] ? find_held_lock+0x36/0x1c0 [ 306.069297] ? find_held_lock+0x36/0x1c0 [ 306.073363] ? mark_held_locks+0xc7/0x130 [ 306.077506] ? _raw_spin_unlock_irq+0x27/0x80 [ 306.081993] ? _raw_spin_unlock_irq+0x27/0x80 [ 306.086485] ? lockdep_hardirqs_on+0x421/0x5c0 [ 306.091065] ? trace_hardirqs_on+0xbd/0x310 [ 306.095381] ? kasan_check_read+0x11/0x20 [ 306.099523] ? p9_fid_create+0x1e2/0x2b0 [ 306.103582] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 306.109035] ? kasan_check_write+0x14/0x20 [ 306.113279] ? do_raw_spin_lock+0xc1/0x200 [ 306.117521] p9_client_walk+0x208/0xb30 [ 306.121580] ? match_held_lock+0x291/0x8d0 [ 306.125816] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 306.131456] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 306.136462] ? d_alloc+0x28b/0x380 [ 306.139999] ? lock_downgrade+0x85c/0x900 [ 306.144148] ? v9fs_fid_add+0x240/0x240 [ 306.148130] ? kasan_check_read+0x11/0x20 [ 306.152277] ? do_raw_spin_unlock+0xa7/0x2f0 [ 306.156697] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 306.161281] v9fs_vfs_lookup+0x1f7/0x4a0 [ 306.165334] ? v9fs_vfs_lookup+0x1f7/0x4a0 [ 306.169584] ? d_alloc+0x290/0x380 [ 306.173126] ? v9fs_vfs_create+0x130/0x130 [ 306.177377] ? lock_rename+0x236/0x290 [ 306.181274] __lookup_hash+0x12e/0x190 [ 306.185169] do_renameat2+0x6c1/0x1180 [ 306.189080] ? user_path_create+0x40/0x40 [ 306.193233] ? __lock_is_held+0xb5/0x140 [ 306.197292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.202846] ? check_preemption_disabled+0x48/0x200 [ 306.207868] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 306.213404] ? do_syscall_64+0x9a/0x820 [ 306.217379] ? do_syscall_64+0x9a/0x820 [ 306.221360] ? trace_hardirqs_on+0xbd/0x310 [ 306.225683] ? __ia32_sys_read+0xb0/0xb0 [ 306.229757] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.235136] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 306.240607] __x64_sys_rename+0x5e/0x80 [ 306.244601] do_syscall_64+0x1b9/0x820 [ 306.248486] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 306.253853] ? syscall_return_slowpath+0x5e0/0x5e0 [ 306.258786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.263651] ? trace_hardirqs_on_caller+0x310/0x310 [ 306.268687] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 306.273703] ? prepare_exit_to_usermode+0x291/0x3b0 [ 306.278715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.283552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.288729] RIP: 0033:0x457569 [ 306.291911] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.310804] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 306.318496] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 306.325745] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 08:21:52 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5452, &(0x7f0000000000)=0x801) 08:21:52 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, r0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 306.333000] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 306.340340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 306.347827] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:52 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x2}, 0x0) 08:21:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2, &(0x7f0000000000)=0x801) 08:21:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xa0ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:52 executing program 2 (fault-call:14 fault-nth:8): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:52 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000000)=0x801) 08:21:52 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x100, 0x200) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x1000, 0x5, 0x92, 0xfffffffffffffffe}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'eql\x00', 0x10001}) 08:21:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:52 executing program 5: r0 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000c00)=[{{&(0x7f0000000200)=@xdp={0x2c, 0x1, r1, 0x1b}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)="4f97825aed013eefd7446d9d3d5308197438ac7947a6b958f9de8b3eaff7d71e98e9817119aa1b18facfc3a2ac5163ce2109ba1e3928bfeb994252e30da2a5a2208edfc67b690198444b498c74fd7f6a5142e5173f7afe3d90b64b2add74fa96979f66fb96d0e8b56ff6e654a7d6972a9839f7737c8b4b91b006880d0839727228c564ef584e223b99a5b22305a19aec6c4f1270a4c0becb876c706ad8929d1265f769171e5595afae2d5d1b140fc354c60a296c591518c33b84939a97d2123f1183a84c8207891d13491095008de6901080b3c95126d9e3056a9236b67f0e76b0cb20b3147f67182cfa027630c40743087481014cc4", 0xf6}, {&(0x7f0000000380)="71147c2e20a4799404595c7dc8ffc84498f88203253079bdca9877aa9fd46f77a4daf82029b962bb5c1aa5fb6dc2b754b516e7f5a6cd5e5c345efce2104bb3a4570122d3408b4b100188d6396e8a64790cfd60bfb2012a9333d3db11bd4fe21be1ff35d1b9863d3d1522231f1a5c", 0x6e}, {&(0x7f0000000400)="8d72fa55f039d95a83ed6924317eca99bfde1971d6c0096d8be74bb58ad710ed59b335d1f3535b9d4123474369ae6321d047d1e284dfe334ca6ee9bfa64fd7d0c62674ae412f207df78906e6353bd1149ab6c4420b70ee474fac82c849de266360d9bdc17ad2c96cd55a5fbf30f398e5254a0dc9eb7aa649cb25b449", 0x7c}, {&(0x7f0000001100)="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", 0x1000}, {&(0x7f0000000480)}], 0x5, &(0x7f0000000540)=[{0xb0, 0x0, 0x3, "39340d1640081a9f8768d6e6387bd8f123f34b48fecd295797dc80be618130d398e029fecbc5d9d65fb8a5651bcbf9197db233d129f4bcb8e5db1306147c59bdb1545665be89f96413d3c04ee50fe239937a5758459832c25a18667a32534372c9dfdd1131c878b24ed9b493be168f7cde90105c7ccc16ba5bc0f87ebfe3b3bda34c38d4a101716f91b2e40f7d828d37375f353c7faffc67abfb5508ef29"}], 0xb0, 0x10}, 0x2}, {{&(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x0, 0x1, 0x3, 0x1, {0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x21}, 0x9}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000006c0)="cfc9067642562d7f9824e4bab7e0dfc00cb729fb81ad5f533641ad3f9b2883299b358a393079d93710714a432f541399847ea316c5ba2e781894f961a1b4ec2f653d8635b4ac310c7ccbf84912839b14dddeb7b6ff7ab8e3e9d870ab0ac25a813557", 0x62}, {&(0x7f0000000740)="097447110f0215ac4ed402a80b626e8754f4726a3265d1339e4888999aa8590683d26e736412d8aad6f00b9ec4e43aa1b4f7c8a0bd8906a3c54f1f065991743edead7158f9a50b51268b061fab9025bdb73d86beee471cdb5469d8df0d310fc85e89028192a3a61c882664dcd2240d2316c6245313858e14b716db9ee75ef672e253536b3e8fafe88ee0fefd92f144319a49a82f849119ed247ac6af51f2025cb9a2a59591dfcf35f9f79b462730ee6b89b1b0b598f72319490ab8a7196a3ecf59efc09a6083cc148be7a5", 0xcb}, {&(0x7f0000000840)="38bdd8e8908089f92ef7267c2642fc27bc89960d05f56c7cd9c97795a333d2dc16b41c3bc7db2f66a3fb8bf23941a4f50b0a469c8ba7dfad707e1dead1f202d0f1486942a955284f0b2f4cd53cd98e", 0x4f}, {&(0x7f00000008c0)="7977e8bdb23133fb8b36240857fb2a89da1cb398712fd8b18036a8b003dfb034bb31aafc72e67dc35caa2a330d6e0dcefc9002c7bdb72e04b63a5ec76e91a007f74ab7de1734e0", 0x47}, {&(0x7f0000000940)="823f594084533b2768e092c46c1eced6ff186f913b9da0f55635af9052a4ce12d7d31ca741a930869f8b40e09021572092e20c1073d169d2a9de6c03411555d0751cb7401bfab7a4ddd8e0619fbaa5c9f41bc73587c99dd08c2d69a74aae840942f20940c302a551f85e771028632452db4589c917a2f89b1c032724e4e39649b7fa70bf766909f126dd348948fe4fda656c39491f6de19cd4ebc0ea1d84db4bfef16b9f76b96a9ad2cd541e4999", 0xae}, {&(0x7f0000000a00)="067c3c016b21a0531b9f6b7f5f43e55abb7ca5099876f1907db713d2e7e7ba9c618e8cb0d6bae6987e91bb415b4d95138768b9de2aec9e1a826c1df1401ddde0825ee239164343a212cad3637cd8b9e26a2adc18f4fb69b5ea43e9677e9726481ce8b2460826aa9bccf36b6e420ed975c3fdaa33ef94699614beb63417f3ee19316591e52057", 0x86}, {&(0x7f0000000ac0)="304b32b7ac5e403d7332cd2b0ff090982689df957f2eaf834dc7097a84ba25707c877d27e109a5c740d4599e90c2239fb2f8bb01c460a82a50ffb2a655f8bd37ed27f8b74422506d37cdfbb2eca0caa1954112085d5df808ed721b300bae86b7bd04be42f6eb208c9d27b4a81e92516ce3e404678e93f3185ba96fd0a92b3432502133d581a857ba56b5f9d954b221dd14ce63a6dc692856", 0x98}], 0x7, &(0x7f0000002100)=[{0x60, 0x103, 0x8, "7c8aed6e3da541cd1282c2c8e534b6cd4d86d6b87c73c424c67846fa30dd9c0e2befcfe253502aa359ed98ca62d502b052159371ad0724916be427671b76e4f3b5bc2e9f18133b2124d9"}, {0xf0, 0x1ff, 0x4, "ee213f6508fb3c7990c21e21269f735fe2b159699c505e50e9f20b25aecf1339c576c6cea8cc06d87c44016d08c3d21a45a2ed9ab834e8a54cfee02215597b71fa93e7f8d230059d8a149c34c5d192a9e22df483fe177e4850d8d6055d7dab9f6484957e37a4d65667d8d379af49096dd2d4e98767195cbf640beb07e7c225f15278aabfbb132d928971d186fc581fab1422a189ab43788557285cede1836d58f27470b54902f9b1faef936498155aa23991cc5a1b85428f2d24e1f727b75d122369e66e82b302b991194c784158f32c2ebe99459b1879769e55b1f64c1e"}, {0x1010, 0x117, 0x2, "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"}, {0xc8, 0x113, 0x401, "c3dc1c5d75ece162db9fca882110bf9048d6a866df81d463c52829ac5dd4ffdda7d67a262a6f1ff49920af8456a09b679945a1ab9a16eaab30ea6eebaf90f12753ea252abb19cfc29e923d37115fcff0558eb2404875d414ffeb3f8ec6697bf1bd8d15019a4b844528dd726c6a9843242495100e8d92d9284516569f4562e3c324be481e49c452a765dac0204c73bb93b0b66f639d2fc745e2190b4c90f25609ccfb3cb83bcbd7c3ced5655937a158f10975aa9d5ff6"}, {0x100, 0x11f, 0x81, "2434c9a0d084f5e2d07c665c06750a382be59c2054b4336264810902c097e63fb6b6171bd3784612d2c6ebf98a4f7031ffdde6d2959ee038f1ef98f70212d52cf2d7b328d8b31a17f7b0b16e9306c7d141f437165b59ee9fab048eb20a35a6603c3d0577c9720a724d7ef0856c0fa54448442deec0a43d8d09ada53f743fef59a03215debd65f80721c178ccbd549e0fd64f4cfcda236adb94ace4ade63ad858f7f6cb92b3ecf8d2bc96b8cec4c46c47e7a147bcd7953bd4b7f58633b0659d364f8334b70df0b7073678d4956b70a31abf88a9d16a5805049d08aa22b22e335ea0283582d335db3f60"}], 0x1328, 0x1}, 0x462d}], 0x2, 0x20000000) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 306.646157] FAULT_INJECTION: forcing a failure. [ 306.646157] name failslab, interval 1, probability 0, space 0, times 0 08:21:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40049409, &(0x7f0000000000)=0x801) 08:21:52 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000000)=0x801) 08:21:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x6800000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 306.701345] CPU: 1 PID: 10833 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 306.708655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.718004] Call Trace: [ 306.720611] dump_stack+0x1c4/0x2b4 [ 306.724250] ? dump_stack_print_info.cold.2+0x52/0x52 [ 306.729445] ? p9pdu_writef+0xe0/0xe0 [ 306.733260] should_fail.cold.4+0xa/0x17 [ 306.737333] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 306.742443] ? lockdep_hardirqs_on+0x421/0x5c0 [ 306.747026] ? preempt_schedule+0x4d/0x60 [ 306.751176] ? pdu_read+0x90/0xd0 [ 306.754640] ? graph_lock+0x170/0x170 [ 306.758443] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 306.763982] ? p9pdu_readf+0xb6a/0x2130 [ 306.767959] ? p9pdu_writef+0xe0/0xe0 [ 306.771768] ? assoc_array_apply_edit+0x341/0x630 [ 306.776623] ? __lock_is_held+0xb5/0x140 [ 306.780813] ? ___might_sleep+0x1ed/0x300 [ 306.784957] ? arch_local_save_flags+0x40/0x40 [ 306.789529] ? check_preemption_disabled+0x48/0x200 [ 306.794548] __should_failslab+0x124/0x180 [ 306.798776] should_failslab+0x9/0x14 [ 306.802563] __kmalloc+0x2d4/0x760 [ 306.806093] ? p9pdu_readf+0x1928/0x2130 [ 306.810145] p9pdu_readf+0x1928/0x2130 [ 306.814054] ? p9pdu_writef+0xe0/0xe0 [ 306.817847] ? find_held_lock+0x36/0x1c0 [ 306.821902] ? finish_wait+0x430/0x430 [ 306.825777] ? mark_held_locks+0xc7/0x130 [ 306.829917] ? _raw_spin_unlock_irq+0x27/0x80 [ 306.834396] ? _raw_spin_unlock_irq+0x27/0x80 [ 306.838882] ? lockdep_hardirqs_on+0x421/0x5c0 [ 306.843448] ? trace_hardirqs_on+0xbd/0x310 [ 306.847756] ? p9_fid_create+0x1e2/0x2b0 [ 306.851806] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 306.857244] ? kasan_check_write+0x14/0x20 [ 306.861468] ? do_raw_spin_lock+0xc1/0x200 [ 306.865698] p9_client_walk+0x3ba/0xb30 [ 306.869662] ? match_held_lock+0x291/0x8d0 [ 306.873891] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 306.879505] ? v9fs_show_options+0xb1/0x7e0 [ 306.883811] ? d_alloc+0x28b/0x380 [ 306.887340] ? lock_downgrade+0x85c/0x900 [ 306.891473] ? v9fs_fid_add+0x240/0x240 [ 306.895433] ? kasan_check_read+0x11/0x20 [ 306.899569] ? do_raw_spin_unlock+0xa7/0x2f0 [ 306.903974] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 306.908551] v9fs_vfs_lookup+0x1f7/0x4a0 [ 306.912607] ? v9fs_vfs_lookup+0x1f7/0x4a0 [ 306.916828] ? d_alloc+0x290/0x380 [ 306.920355] ? v9fs_vfs_create+0x130/0x130 [ 306.924577] ? lock_rename+0x236/0x290 [ 306.928465] __lookup_hash+0x12e/0x190 [ 306.932339] do_renameat2+0x6c1/0x1180 [ 306.936222] ? user_path_create+0x40/0x40 [ 306.940355] ? __lock_is_held+0xb5/0x140 [ 306.944407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.949930] ? check_preemption_disabled+0x48/0x200 [ 306.954946] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 306.960474] ? do_syscall_64+0x9a/0x820 [ 306.964434] ? do_syscall_64+0x9a/0x820 [ 306.968395] ? trace_hardirqs_on+0xbd/0x310 [ 306.972718] ? __ia32_sys_read+0xb0/0xb0 [ 306.976762] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.982114] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 306.987554] __x64_sys_rename+0x5e/0x80 [ 306.991523] do_syscall_64+0x1b9/0x820 [ 306.995409] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.000757] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.005673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.010498] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.015496] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.020502] ? prepare_exit_to_usermode+0x291/0x3b0 [ 307.025504] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.030336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.035506] RIP: 0033:0x457569 [ 307.038700] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.057589] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 307.065281] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 307.072533] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 307.079786] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 307.087041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 307.094292] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') write$eventfd(r1, &(0x7f0000000080)=0x8, 0x8) 08:21:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xa0ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x80ffffff00000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:53 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x200000000000000}, 0x0) 08:21:53 executing program 2 (fault-call:14 fault-nth:9): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:53 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, &(0x7f0000000000)=0x801) 08:21:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5452, &(0x7f0000000000)=0x801) [ 307.496815] FAULT_INJECTION: forcing a failure. [ 307.496815] name failslab, interval 1, probability 0, space 0, times 0 [ 307.511894] CPU: 0 PID: 10879 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 307.519395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.528733] Call Trace: [ 307.531315] dump_stack+0x1c4/0x2b4 [ 307.534941] ? dump_stack_print_info.cold.2+0x52/0x52 [ 307.540133] ? rcu_bh_qs+0xc0/0xc0 [ 307.543655] ? unwind_dump+0x190/0x190 [ 307.547618] should_fail.cold.4+0xa/0x17 [ 307.551665] ? is_bpf_text_address+0xd3/0x170 [ 307.556145] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.561230] ? __kernel_text_address+0xd/0x40 [ 307.565710] ? unwind_get_return_address+0x61/0xa0 [ 307.570627] ? graph_lock+0x170/0x170 [ 307.574421] ? graph_lock+0x170/0x170 [ 307.578211] ? find_held_lock+0x36/0x1c0 [ 307.582259] ? __lock_is_held+0xb5/0x140 [ 307.586314] ? ___might_sleep+0x1ed/0x300 [ 307.590444] ? arch_local_save_flags+0x40/0x40 [ 307.595009] ? mark_held_locks+0xc7/0x130 [ 307.599144] __should_failslab+0x124/0x180 [ 307.603366] should_failslab+0x9/0x14 [ 307.607149] kmem_cache_alloc_trace+0x2d7/0x750 [ 307.611801] ? p9_client_walk+0x57e/0xb30 [ 307.615942] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 307.621380] p9_client_stat+0xc1/0x720 [ 307.625251] ? p9_client_walk+0x57e/0xb30 [ 307.629379] ? p9_client_mknod_dotl+0x650/0x650 [ 307.634045] ? p9_client_walk+0x24c/0xb30 [ 307.638176] ? match_held_lock+0x291/0x8d0 [ 307.642395] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 307.648004] ? v9fs_show_options+0xb1/0x7e0 [ 307.652306] ? d_alloc+0x28b/0x380 [ 307.655828] ? lock_downgrade+0x85c/0x900 [ 307.659969] v9fs_inode_from_fid+0x7a/0x350 [ 307.664269] ? do_raw_spin_unlock+0xa7/0x2f0 [ 307.668689] ? v9fs_vfs_getattr+0x270/0x270 [ 307.673004] v9fs_vfs_lookup+0x3f5/0x4a0 [ 307.677056] ? d_alloc+0x290/0x380 [ 307.680581] ? v9fs_vfs_create+0x130/0x130 [ 307.684795] ? lock_rename+0x236/0x290 [ 307.688667] __lookup_hash+0x12e/0x190 [ 307.692547] do_renameat2+0x6c1/0x1180 [ 307.696428] ? user_path_create+0x40/0x40 [ 307.700556] ? __lock_is_held+0xb5/0x140 [ 307.704629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.710148] ? check_preemption_disabled+0x48/0x200 [ 307.715152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.720671] ? do_syscall_64+0x9a/0x820 [ 307.724628] ? do_syscall_64+0x9a/0x820 [ 307.728583] ? trace_hardirqs_on+0xbd/0x310 [ 307.732886] ? __ia32_sys_read+0xb0/0xb0 [ 307.736929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.742272] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 307.747707] __x64_sys_rename+0x5e/0x80 [ 307.751663] do_syscall_64+0x1b9/0x820 [ 307.755535] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.760878] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.765786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.770612] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.775612] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.780613] ? prepare_exit_to_usermode+0x291/0x3b0 [ 307.785718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.790543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.795711] RIP: 0033:0x457569 [ 307.798884] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.817766] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 307.825457] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 307.832708] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 307.839963] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 08:21:53 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x8e0) 08:21:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000000)=0x801) 08:21:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xf000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 307.847214] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 307.854466] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x7a00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:54 executing program 5 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xa0ffffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:54 executing program 2 (fault-call:14 fault-nth:10): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x22, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 308.089609] FAULT_INJECTION: forcing a failure. [ 308.089609] name failslab, interval 1, probability 0, space 0, times 0 [ 308.143461] CPU: 0 PID: 10908 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 308.150784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.160130] Call Trace: [ 308.162720] dump_stack+0x1c4/0x2b4 [ 308.166361] ? dump_stack_print_info.cold.2+0x52/0x52 [ 308.171575] ? __kernel_text_address+0xd/0x40 [ 308.176073] ? unwind_get_return_address+0x61/0xa0 [ 308.181023] should_fail.cold.4+0xa/0x17 [ 308.185083] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.185110] ? pdu_read+0x90/0xd0 [ 308.185127] ? graph_lock+0x170/0x170 [ 308.193651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.193665] ? p9pdu_readf+0xb6a/0x2130 [ 308.193680] ? do_syscall_64+0x1b9/0x820 [ 308.193697] ? __switch_to_asm+0x40/0x70 [ 308.215098] ? p9pdu_writef+0xe0/0xe0 [ 308.218899] ? __switch_to_asm+0x40/0x70 [ 308.222954] ? native_usergs_sysret64+0x5/0x10 [ 308.227532] ? __lock_is_held+0xb5/0x140 [ 308.231571] ? graph_lock+0x170/0x170 [ 308.235360] ? ___might_sleep+0x1ed/0x300 [ 308.239506] ? arch_local_save_flags+0x40/0x40 [ 308.244084] ? __lock_is_held+0xb5/0x140 [ 308.248140] __should_failslab+0x124/0x180 [ 308.252355] should_failslab+0x9/0x14 [ 308.256139] __kmalloc+0x2d4/0x760 [ 308.259678] ? memcpy+0x45/0x50 [ 308.262969] ? p9pdu_readf+0x529/0x2130 [ 308.266931] p9pdu_readf+0x529/0x2130 [ 308.270787] ? p9pdu_writef+0xe0/0xe0 [ 308.274570] ? graph_lock+0x170/0x170 [ 308.278351] ? __down+0x3e5/0x520 [ 308.281799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.287335] ? check_preemption_disabled+0x48/0x200 08:21:54 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x10000000}, 0x0) 08:21:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5421, &(0x7f0000000000)=0x801) 08:21:54 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x810) 08:21:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x5000000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 308.292335] ? check_preemption_disabled+0x48/0x200 [ 308.297352] ? __lock_is_held+0xb5/0x140 [ 308.301410] ? graph_lock+0x170/0x170 [ 308.305203] ? check_preemption_disabled+0x48/0x200 [ 308.310199] ? check_preemption_disabled+0x48/0x200 [ 308.315198] ? __lock_is_held+0xb5/0x140 [ 308.319256] p9pdu_readf+0xd2c/0x2130 [ 308.323090] ? p9pdu_writef+0xe0/0xe0 [ 308.326890] ? find_held_lock+0x36/0x1c0 [ 308.330950] ? graph_lock+0x170/0x170 [ 308.334752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.340294] ? check_preemption_disabled+0x48/0x200 [ 308.345807] ? check_preemption_disabled+0x48/0x200 [ 308.350825] ? finish_wait+0x430/0x430 [ 308.354719] ? __lock_is_held+0xb5/0x140 [ 308.358796] ? kmem_cache_alloc_trace+0x353/0x750 [ 308.358811] ? p9_client_walk+0x57e/0xb30 [ 308.358829] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 308.358847] p9_client_stat+0x264/0x720 [ 308.358862] ? p9_client_walk+0x57e/0xb30 [ 308.367816] ? p9_client_mknod_dotl+0x650/0x650 [ 308.367829] ? p9_client_walk+0x24c/0xb30 [ 308.367842] ? match_held_lock+0x291/0x8d0 [ 308.367861] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 308.367874] ? v9fs_show_options+0xb1/0x7e0 [ 308.367889] ? d_alloc+0x28b/0x380 [ 308.407831] ? lock_downgrade+0x85c/0x900 [ 308.411982] v9fs_inode_from_fid+0x7a/0x350 [ 308.416305] ? do_raw_spin_unlock+0xa7/0x2f0 [ 308.420717] ? v9fs_vfs_getattr+0x270/0x270 [ 308.425049] v9fs_vfs_lookup+0x3f5/0x4a0 [ 308.429110] ? d_alloc+0x290/0x380 [ 308.432656] ? v9fs_vfs_create+0x130/0x130 [ 308.436891] ? lock_rename+0x236/0x290 [ 308.440792] __lookup_hash+0x12e/0x190 [ 308.444692] do_renameat2+0x6c1/0x1180 [ 308.448594] ? user_path_create+0x40/0x40 [ 308.452746] ? __lock_is_held+0xb5/0x140 [ 308.456816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.462355] ? check_preemption_disabled+0x48/0x200 [ 308.467383] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.472956] ? do_syscall_64+0x9a/0x820 [ 308.476934] ? do_syscall_64+0x9a/0x820 [ 308.480914] ? trace_hardirqs_on+0xbd/0x310 [ 308.485248] ? __ia32_sys_read+0xb0/0xb0 [ 308.489311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 08:21:54 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x808) [ 308.494681] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 308.500145] __x64_sys_rename+0x5e/0x80 [ 308.504122] do_syscall_64+0x1b9/0x820 [ 308.508017] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.513396] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.518346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.523201] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.528218] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.533225] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.538235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.543078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.548259] RIP: 0033:0x457569 [ 308.551453] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.570342] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 308.578042] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 308.585295] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 308.592549] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 308.599804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 308.607071] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:54 executing program 2 (fault-call:14 fault-nth:11): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5460, &(0x7f0000000000)=0x801) 08:21:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x100000000000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x3f000000, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 308.880385] FAULT_INJECTION: forcing a failure. [ 308.880385] name failslab, interval 1, probability 0, space 0, times 0 [ 308.907650] CPU: 0 PID: 10946 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 308.914945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.924296] Call Trace: [ 308.926894] dump_stack+0x1c4/0x2b4 [ 308.930532] ? dump_stack_print_info.cold.2+0x52/0x52 [ 308.935739] ? _raw_spin_unlock_irq+0x27/0x80 [ 308.940253] ? _raw_spin_unlock_irq+0x27/0x80 [ 308.944763] should_fail.cold.4+0xa/0x17 [ 308.948836] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.953945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.959484] ? pdu_read+0x90/0xd0 [ 308.962931] ? graph_lock+0x170/0x170 [ 308.966716] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.972238] ? p9pdu_readf+0xb6a/0x2130 [ 308.976203] ? __switch_to_asm+0x34/0x70 [ 308.980247] ? __switch_to_asm+0x40/0x70 [ 308.984289] ? p9pdu_writef+0xe0/0xe0 [ 308.988066] ? __switch_to_asm+0x40/0x70 [ 308.992107] ? native_usergs_sysret64+0x1/0x10 [ 308.996669] ? __lock_is_held+0xb5/0x140 [ 309.000713] ? ubifs_recover_leb+0xe20/0x2630 [ 309.005195] ? ___might_sleep+0x1ed/0x300 [ 309.009324] ? arch_local_save_flags+0x40/0x40 [ 309.013888] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.019418] ? p9pdu_readf+0xb6a/0x2130 [ 309.023381] __should_failslab+0x124/0x180 [ 309.027610] should_failslab+0x9/0x14 [ 309.031395] __kmalloc+0x2d4/0x760 [ 309.034925] ? memcpy+0x45/0x50 [ 309.038185] ? p9pdu_readf+0x529/0x2130 [ 309.042145] p9pdu_readf+0x529/0x2130 [ 309.045944] ? p9pdu_writef+0xe0/0xe0 [ 309.049761] ? graph_lock+0x170/0x170 [ 309.053549] ? __down+0x3e1/0x520 [ 309.056987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.062512] ? check_preemption_disabled+0x48/0x200 [ 309.067510] ? check_preemption_disabled+0x48/0x200 [ 309.072515] ? __lock_is_held+0xb5/0x140 [ 309.076563] ? graph_lock+0x170/0x170 [ 309.080351] ? check_preemption_disabled+0x48/0x200 [ 309.085351] ? check_preemption_disabled+0x48/0x200 [ 309.090353] ? __lock_is_held+0xb5/0x140 [ 309.094397] p9pdu_readf+0xd2c/0x2130 [ 309.098197] ? p9pdu_writef+0xe0/0xe0 [ 309.101982] ? find_held_lock+0x36/0x1c0 [ 309.106028] ? graph_lock+0x170/0x170 [ 309.109830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.115359] ? check_preemption_disabled+0x48/0x200 [ 309.120358] ? check_preemption_disabled+0x48/0x200 [ 309.125355] ? finish_wait+0x430/0x430 [ 309.129223] ? __lock_is_held+0xb5/0x140 [ 309.133272] ? kmem_cache_alloc_trace+0x353/0x750 [ 309.138097] ? p9_client_walk+0x57e/0xb30 [ 309.142231] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 309.147669] p9_client_stat+0x264/0x720 [ 309.151634] ? p9_client_walk+0x57e/0xb30 [ 309.155771] ? p9_client_mknod_dotl+0x650/0x650 [ 309.160428] ? p9_client_walk+0x24c/0xb30 [ 309.164573] ? match_held_lock+0x291/0x8d0 [ 309.168791] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 309.174411] ? v9fs_show_options+0xb1/0x7e0 [ 309.178712] ? d_alloc+0x28b/0x380 [ 309.182234] ? lock_downgrade+0x85c/0x900 [ 309.186376] v9fs_inode_from_fid+0x7a/0x350 [ 309.190690] ? do_raw_spin_unlock+0xa7/0x2f0 [ 309.195084] ? v9fs_vfs_getattr+0x270/0x270 [ 309.199408] v9fs_vfs_lookup+0x3f5/0x4a0 [ 309.203451] ? d_alloc+0x290/0x380 [ 309.206985] ? v9fs_vfs_create+0x130/0x130 [ 309.211203] ? lock_rename+0x236/0x290 [ 309.215183] __lookup_hash+0x12e/0x190 [ 309.219074] do_renameat2+0x6c1/0x1180 [ 309.222958] ? user_path_create+0x40/0x40 [ 309.227092] ? __lock_is_held+0xb5/0x140 [ 309.231142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.236664] ? check_preemption_disabled+0x48/0x200 [ 309.241678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.247204] ? do_syscall_64+0x9a/0x820 [ 309.251175] ? do_syscall_64+0x9a/0x820 [ 309.255135] ? trace_hardirqs_on+0xbd/0x310 [ 309.259538] ? __ia32_sys_read+0xb0/0xb0 [ 309.263586] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.268939] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 309.274377] __x64_sys_rename+0x5e/0x80 [ 309.278355] do_syscall_64+0x1b9/0x820 [ 309.282228] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.287578] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.292490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.297319] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.302317] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.307334] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.312335] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.317163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.322336] RIP: 0033:0x457569 [ 309.325515] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.344407] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 309.352098] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 309.359349] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 309.366600] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 309.373851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 08:21:55 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x7000000}, 0x0) [ 309.381099] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0xb0ffffff, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:55 executing program 2 (fault-call:14 fault-nth:12): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:55 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x80f) 08:21:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x22, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5450, &(0x7f0000000000)=0x801) 08:21:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x7000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 309.596761] FAULT_INJECTION: forcing a failure. [ 309.596761] name failslab, interval 1, probability 0, space 0, times 0 08:21:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 309.676013] CPU: 0 PID: 10968 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 309.683432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.692787] Call Trace: [ 309.695394] dump_stack+0x1c4/0x2b4 [ 309.699032] ? dump_stack_print_info.cold.2+0x52/0x52 [ 309.704230] ? __kernel_text_address+0xd/0x40 [ 309.708744] ? unwind_get_return_address+0x61/0xa0 [ 309.713668] should_fail.cold.4+0xa/0x17 [ 309.717716] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.722823] ? pdu_read+0x90/0xd0 [ 309.726284] ? graph_lock+0x170/0x170 [ 309.730081] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.735601] ? p9pdu_readf+0xb6a/0x2130 [ 309.739563] ? do_syscall_64+0x1b9/0x820 [ 309.743610] ? __switch_to_asm+0x40/0x70 [ 309.747671] ? p9pdu_writef+0xe0/0xe0 [ 309.751456] ? __switch_to_asm+0x40/0x70 [ 309.755501] ? native_usergs_sysret64+0x5/0x10 [ 309.760072] ? __lock_is_held+0xb5/0x140 [ 309.764114] ? graph_lock+0x170/0x170 [ 309.767910] ? ___might_sleep+0x1ed/0x300 [ 309.772047] ? arch_local_save_flags+0x40/0x40 [ 309.776636] ? __lock_is_held+0xb5/0x140 [ 309.780703] __should_failslab+0x124/0x180 [ 309.784923] should_failslab+0x9/0x14 [ 309.788727] __kmalloc+0x2d4/0x760 [ 309.792254] ? memcpy+0x45/0x50 [ 309.795516] ? p9pdu_readf+0x529/0x2130 [ 309.799486] p9pdu_readf+0x529/0x2130 [ 309.803278] ? p9pdu_writef+0xe0/0xe0 [ 309.807067] ? graph_lock+0x170/0x170 [ 309.810855] ? __down+0x3e5/0x520 [ 309.814291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.819817] ? check_preemption_disabled+0x48/0x200 [ 309.824821] ? check_preemption_disabled+0x48/0x200 [ 309.829830] ? __lock_is_held+0xb5/0x140 [ 309.833874] ? graph_lock+0x170/0x170 [ 309.837663] ? check_preemption_disabled+0x48/0x200 [ 309.842666] ? check_preemption_disabled+0x48/0x200 [ 309.847673] ? __lock_is_held+0xb5/0x140 [ 309.851740] p9pdu_readf+0xd2c/0x2130 [ 309.855533] ? p9pdu_writef+0xe0/0xe0 [ 309.859316] ? find_held_lock+0x36/0x1c0 [ 309.863372] ? graph_lock+0x170/0x170 [ 309.867161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.872682] ? check_preemption_disabled+0x48/0x200 [ 309.877679] ? check_preemption_disabled+0x48/0x200 [ 309.882680] ? finish_wait+0x430/0x430 [ 309.886556] ? __lock_is_held+0xb5/0x140 [ 309.890612] ? kmem_cache_alloc_trace+0x353/0x750 [ 309.895439] ? p9_client_walk+0x57e/0xb30 [ 309.899577] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 309.905016] p9_client_stat+0x264/0x720 [ 309.908976] ? p9_client_walk+0x57e/0xb30 [ 309.913113] ? p9_client_mknod_dotl+0x650/0x650 [ 309.917763] ? p9_client_walk+0x24c/0xb30 [ 309.921896] ? match_held_lock+0x291/0x8d0 [ 309.926116] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 309.931725] ? v9fs_show_options+0xb1/0x7e0 [ 309.936027] ? d_alloc+0x28b/0x380 [ 309.939549] ? lock_downgrade+0x85c/0x900 [ 309.943687] v9fs_inode_from_fid+0x7a/0x350 [ 309.947990] ? do_raw_spin_unlock+0xa7/0x2f0 [ 309.952383] ? v9fs_vfs_getattr+0x270/0x270 [ 309.956694] v9fs_vfs_lookup+0x3f5/0x4a0 [ 309.960738] ? d_alloc+0x290/0x380 [ 309.964268] ? v9fs_vfs_create+0x130/0x130 [ 309.968489] ? lock_rename+0x236/0x290 [ 309.972368] __lookup_hash+0x12e/0x190 [ 309.976247] do_renameat2+0x6c1/0x1180 [ 309.980139] ? user_path_create+0x40/0x40 [ 309.984273] ? __lock_is_held+0xb5/0x140 [ 309.988320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.993877] ? check_preemption_disabled+0x48/0x200 [ 309.998887] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.004414] ? do_syscall_64+0x9a/0x820 [ 310.008375] ? do_syscall_64+0x9a/0x820 [ 310.012349] ? trace_hardirqs_on+0xbd/0x310 [ 310.016658] ? __ia32_sys_read+0xb0/0xb0 [ 310.020705] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.026056] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 310.031498] __x64_sys_rename+0x5e/0x80 [ 310.035461] do_syscall_64+0x1b9/0x820 [ 310.039347] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.044700] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.049613] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.054446] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.059453] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.064459] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.069466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.074297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.079478] RIP: 0033:0x457569 [ 310.082661] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.101546] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 310.109240] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 310.116503] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 310.123766] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 310.131034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 310.138287] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x2000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:56 executing program 2 (fault-call:14 fault-nth:13): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:56 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x802) 08:21:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x808) 08:21:56 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x300}, 0x0) 08:21:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000067c0)=""/217) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() recvmmsg(r0, &(0x7f0000006580)=[{{&(0x7f0000000080)=@vsock, 0x80, &(0x7f0000000900)=[{&(0x7f0000000100)=""/60, 0x3c}, {&(0x7f0000000300)=""/181, 0xb5}, {&(0x7f00000003c0)=""/65, 0x41}, {&(0x7f0000000540)=""/168, 0xa8}, {&(0x7f0000000600)=""/177, 0xb1}, {&(0x7f00000006c0)=""/160, 0xa0}, {&(0x7f0000000780)=""/172, 0xac}, {&(0x7f0000000840)=""/189, 0xbd}], 0x8, &(0x7f0000000980)=""/252, 0xfc, 0x2}, 0x62}, {{&(0x7f0000000a80)=@llc, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/28, 0x1c}], 0x1, &(0x7f0000000b00)=""/163, 0xa3, 0x2}}, {{&(0x7f0000000bc0)=@rc, 0x80, &(0x7f0000001080)=[{&(0x7f0000000c40)=""/143, 0x8f}, {&(0x7f0000000d00)=""/77, 0x4d}, {&(0x7f0000000d80)=""/119, 0x77}, {&(0x7f0000000e00)=""/150, 0x96}, {&(0x7f0000000ec0)=""/155, 0x9b}, {&(0x7f0000000f80)=""/210, 0xd2}], 0x6, &(0x7f0000001100)=""/233, 0xe9, 0xfffffffffffffffe}, 0x3}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000001200)=""/124, 0x7c}, {&(0x7f0000001280)=""/84, 0x54}], 0x2, &(0x7f0000001340)=""/139, 0x8b, 0x4}, 0x1}, {{&(0x7f0000001400)=@l2, 0x80, &(0x7f0000003800)=[{&(0x7f0000001480)=""/89, 0x59}, {&(0x7f0000001500)=""/187, 0xbb}, {&(0x7f00000015c0)=""/95, 0x5f}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/143, 0x8f}, {&(0x7f0000002700)=""/4096, 0x1000}, {&(0x7f0000003700)=""/220, 0xdc}], 0x7, &(0x7f0000003880)=""/92, 0x5c, 0x4a}, 0x8}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000003900)=""/159, 0x9f}, {&(0x7f00000039c0)=""/93, 0x5d}, {&(0x7f0000003a40)=""/187, 0xbb}, {&(0x7f0000003b00)=""/188, 0xbc}, {&(0x7f0000003bc0)=""/4096, 0x1000}, {&(0x7f0000004bc0)=""/161, 0xa1}, {&(0x7f0000004c80)=""/211, 0xd3}, {&(0x7f0000004d80)=""/56, 0x38}], 0x8, &(0x7f0000004e40)=""/168, 0xa8, 0x3}, 0x20}, {{&(0x7f0000004f00)=@sco, 0x80, &(0x7f0000005000)=[{&(0x7f0000004f80)=""/121, 0x79}], 0x1, &(0x7f0000005040)=""/212, 0xd4, 0x9}, 0x5}, {{&(0x7f0000005140)=@hci, 0x80, &(0x7f00000064c0)=[{&(0x7f00000051c0)=""/153, 0x99}, {&(0x7f0000005280)=""/64, 0x40}, {&(0x7f00000052c0)=""/168, 0xa8}, {&(0x7f0000005380)=""/39, 0x27}, {&(0x7f00000053c0)=""/147, 0x93}, {&(0x7f0000005480)}, {&(0x7f00000054c0)=""/4096, 0x1000}], 0x7, &(0x7f0000006540)=""/1, 0x1}, 0x4}], 0x8, 0x2, &(0x7f0000006780)={0x0, 0x1c9c380}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x60, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 310.349531] FAULT_INJECTION: forcing a failure. [ 310.349531] name failslab, interval 1, probability 0, space 0, times 0 [ 310.406386] CPU: 0 PID: 10993 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 310.413687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.423037] Call Trace: [ 310.425625] dump_stack+0x1c4/0x2b4 [ 310.429248] ? dump_stack_print_info.cold.2+0x52/0x52 [ 310.434437] ? __kernel_text_address+0xd/0x40 [ 310.438926] ? unwind_get_return_address+0x61/0xa0 [ 310.443847] should_fail.cold.4+0xa/0x17 [ 310.447896] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.453005] ? pdu_read+0x90/0xd0 [ 310.456447] ? graph_lock+0x170/0x170 [ 310.460231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.465750] ? p9pdu_readf+0xb6a/0x2130 [ 310.469710] ? do_syscall_64+0x1b9/0x820 [ 310.473757] ? __switch_to_asm+0x40/0x70 [ 310.477808] ? p9pdu_writef+0xe0/0xe0 [ 310.481588] ? __switch_to_asm+0x40/0x70 [ 310.485631] ? native_usergs_sysret64+0x5/0x10 [ 310.490199] ? __lock_is_held+0xb5/0x140 [ 310.494241] ? graph_lock+0x170/0x170 [ 310.498036] ? ___might_sleep+0x1ed/0x300 [ 310.502169] ? arch_local_save_flags+0x40/0x40 [ 310.506740] ? __lock_is_held+0xb5/0x140 [ 310.510792] __should_failslab+0x124/0x180 [ 310.515011] should_failslab+0x9/0x14 [ 310.518793] __kmalloc+0x2d4/0x760 [ 310.522317] ? memcpy+0x45/0x50 [ 310.525577] ? p9pdu_readf+0x529/0x2130 [ 310.529534] p9pdu_readf+0x529/0x2130 [ 310.533318] ? p9pdu_writef+0xe0/0xe0 [ 310.537121] ? graph_lock+0x170/0x170 [ 310.540906] ? __down+0x3e5/0x520 [ 310.544348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.549872] ? check_preemption_disabled+0x48/0x200 [ 310.554895] ? check_preemption_disabled+0x48/0x200 [ 310.559904] ? __lock_is_held+0xb5/0x140 [ 310.563957] ? graph_lock+0x170/0x170 [ 310.567741] ? check_preemption_disabled+0x48/0x200 [ 310.572740] ? check_preemption_disabled+0x48/0x200 [ 310.577741] ? __lock_is_held+0xb5/0x140 [ 310.581794] p9pdu_readf+0xd2c/0x2130 [ 310.585587] ? p9pdu_writef+0xe0/0xe0 [ 310.589371] ? find_held_lock+0x36/0x1c0 [ 310.593419] ? graph_lock+0x170/0x170 [ 310.597206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.602725] ? check_preemption_disabled+0x48/0x200 [ 310.607810] ? check_preemption_disabled+0x48/0x200 [ 310.612810] ? finish_wait+0x430/0x430 [ 310.616699] ? __lock_is_held+0xb5/0x140 [ 310.620749] ? kmem_cache_alloc_trace+0x353/0x750 [ 310.625578] ? p9_client_walk+0x57e/0xb30 [ 310.629711] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 310.635148] p9_client_stat+0x264/0x720 [ 310.639103] ? p9_client_walk+0x57e/0xb30 [ 310.643237] ? p9_client_mknod_dotl+0x650/0x650 [ 310.647885] ? p9_client_walk+0x24c/0xb30 [ 310.652017] ? match_held_lock+0x291/0x8d0 [ 310.656243] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 310.661856] ? v9fs_show_options+0xb1/0x7e0 [ 310.666166] ? d_alloc+0x28b/0x380 [ 310.669698] ? lock_downgrade+0x85c/0x900 [ 310.673836] v9fs_inode_from_fid+0x7a/0x350 [ 310.678156] ? do_raw_spin_unlock+0xa7/0x2f0 [ 310.682549] ? v9fs_vfs_getattr+0x270/0x270 [ 310.686859] v9fs_vfs_lookup+0x3f5/0x4a0 [ 310.690905] ? d_alloc+0x290/0x380 [ 310.694429] ? v9fs_vfs_create+0x130/0x130 [ 310.698647] ? lock_rename+0x236/0x290 [ 310.702522] __lookup_hash+0x12e/0x190 [ 310.706398] do_renameat2+0x6c1/0x1180 [ 310.710289] ? user_path_create+0x40/0x40 [ 310.714419] ? __lock_is_held+0xb5/0x140 [ 310.718465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.723983] ? check_preemption_disabled+0x48/0x200 [ 310.728988] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.734512] ? do_syscall_64+0x9a/0x820 [ 310.738474] ? do_syscall_64+0x9a/0x820 [ 310.742435] ? trace_hardirqs_on+0xbd/0x310 [ 310.746741] ? __ia32_sys_read+0xb0/0xb0 [ 310.750787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.756151] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 310.761590] __x64_sys_rename+0x5e/0x80 [ 310.765546] do_syscall_64+0x1b9/0x820 [ 310.769419] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.774780] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.779694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.784522] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.789522] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.794523] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.799527] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.804353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.809522] RIP: 0033:0x457569 [ 310.812697] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.831582] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 310.839278] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 310.846534] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 08:21:56 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x803) [ 310.853784] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 310.861035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 310.868285] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x10000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x803) 08:21:57 executing program 2 (fault-call:14 fault-nth:14): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x2000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 311.057390] FAULT_INJECTION: forcing a failure. [ 311.057390] name failslab, interval 1, probability 0, space 0, times 0 [ 311.078323] CPU: 1 PID: 11021 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 311.085623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.094975] Call Trace: [ 311.097574] dump_stack+0x1c4/0x2b4 [ 311.101211] ? dump_stack_print_info.cold.2+0x52/0x52 [ 311.106416] ? __kernel_text_address+0xd/0x40 [ 311.110929] ? unwind_get_return_address+0x61/0xa0 [ 311.115868] should_fail.cold.4+0xa/0x17 [ 311.119938] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.125054] ? pdu_read+0x90/0xd0 [ 311.128509] ? graph_lock+0x170/0x170 [ 311.132305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.137825] ? p9pdu_readf+0xb6a/0x2130 [ 311.141785] ? do_syscall_64+0x1b9/0x820 [ 311.145833] ? __switch_to_asm+0x40/0x70 [ 311.149880] ? p9pdu_writef+0xe0/0xe0 [ 311.153662] ? __switch_to_asm+0x40/0x70 [ 311.157707] ? entry_SYSCALL_64_stage2+0x1/0x10 [ 311.162362] ? __lock_is_held+0xb5/0x140 [ 311.166402] ? graph_lock+0x170/0x170 [ 311.170196] ? ___might_sleep+0x1ed/0x300 [ 311.174432] ? arch_local_save_flags+0x40/0x40 [ 311.179004] ? __lock_is_held+0xb5/0x140 [ 311.183055] __should_failslab+0x124/0x180 [ 311.187276] should_failslab+0x9/0x14 [ 311.191058] __kmalloc+0x2d4/0x760 [ 311.194580] ? memcpy+0x45/0x50 [ 311.197839] ? p9pdu_readf+0x529/0x2130 [ 311.201797] p9pdu_readf+0x529/0x2130 [ 311.205584] ? p9pdu_writef+0xe0/0xe0 [ 311.209375] ? graph_lock+0x170/0x170 [ 311.213162] ? __down+0x3f1/0x520 [ 311.216604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.222141] ? check_preemption_disabled+0x48/0x200 [ 311.227138] ? check_preemption_disabled+0x48/0x200 [ 311.232152] ? __lock_is_held+0xb5/0x140 [ 311.236198] ? graph_lock+0x170/0x170 [ 311.239997] ? check_preemption_disabled+0x48/0x200 [ 311.245002] ? check_preemption_disabled+0x48/0x200 [ 311.250009] ? __lock_is_held+0xb5/0x140 [ 311.254062] p9pdu_readf+0xd2c/0x2130 [ 311.257858] ? p9pdu_writef+0xe0/0xe0 [ 311.261648] ? find_held_lock+0x36/0x1c0 [ 311.265695] ? graph_lock+0x170/0x170 [ 311.269485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.275007] ? check_preemption_disabled+0x48/0x200 [ 311.280009] ? check_preemption_disabled+0x48/0x200 [ 311.285008] ? finish_wait+0x430/0x430 [ 311.288886] ? __lock_is_held+0xb5/0x140 [ 311.292942] ? kmem_cache_alloc_trace+0x353/0x750 [ 311.297770] ? p9_client_walk+0x57e/0xb30 [ 311.301917] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 311.307356] p9_client_stat+0x264/0x720 [ 311.311314] ? p9_client_walk+0x57e/0xb30 [ 311.315452] ? p9_client_mknod_dotl+0x650/0x650 [ 311.320113] ? p9_client_walk+0x24c/0xb30 [ 311.324244] ? match_held_lock+0x291/0x8d0 [ 311.328478] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 311.334089] ? v9fs_show_options+0xb1/0x7e0 [ 311.338397] ? d_alloc+0x28b/0x380 [ 311.341935] ? lock_downgrade+0x85c/0x900 [ 311.346071] v9fs_inode_from_fid+0x7a/0x350 [ 311.350380] ? do_raw_spin_unlock+0xa7/0x2f0 [ 311.354772] ? v9fs_vfs_getattr+0x270/0x270 [ 311.359085] v9fs_vfs_lookup+0x3f5/0x4a0 [ 311.363130] ? d_alloc+0x290/0x380 [ 311.366655] ? v9fs_vfs_create+0x130/0x130 [ 311.370872] ? lock_rename+0x236/0x290 [ 311.374748] __lookup_hash+0x12e/0x190 [ 311.378625] do_renameat2+0x6c1/0x1180 [ 311.382509] ? user_path_create+0x40/0x40 [ 311.386640] ? __lock_is_held+0xb5/0x140 [ 311.390687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.396220] ? check_preemption_disabled+0x48/0x200 [ 311.401233] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.406759] ? do_syscall_64+0x9a/0x820 [ 311.410720] ? do_syscall_64+0x9a/0x820 [ 311.414704] ? trace_hardirqs_on+0xbd/0x310 [ 311.419021] ? __ia32_sys_read+0xb0/0xb0 [ 311.423073] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.428425] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 311.433875] __x64_sys_rename+0x5e/0x80 [ 311.437836] do_syscall_64+0x1b9/0x820 [ 311.441706] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.447059] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.451974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.456805] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.461802] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.466807] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.471812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.476648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.481827] RIP: 0033:0x457569 [ 311.485025] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:21:57 executing program 2 (fault-call:14 fault-nth:15): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') [ 311.503910] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 311.511606] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 311.519370] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 311.526627] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 311.533884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 311.541140] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:57 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x700}, 0x0) [ 311.652710] FAULT_INJECTION: forcing a failure. [ 311.652710] name failslab, interval 1, probability 0, space 0, times 0 [ 311.666378] CPU: 1 PID: 11032 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 311.673766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.683116] Call Trace: [ 311.685720] dump_stack+0x1c4/0x2b4 [ 311.689359] ? dump_stack_print_info.cold.2+0x52/0x52 [ 311.694571] should_fail.cold.4+0xa/0x17 [ 311.698645] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.703745] ? node_tag_set+0xc6/0x170 [ 311.707625] ? graph_lock+0x170/0x170 [ 311.711414] ? graph_lock+0x170/0x170 [ 311.715215] ? find_held_lock+0x36/0x1c0 [ 311.719263] ? __lock_is_held+0xb5/0x140 [ 311.723317] ? ___might_sleep+0x1ed/0x300 [ 311.727451] ? arch_local_save_flags+0x40/0x40 [ 311.732014] ? ilookup5_nowait+0x84/0xc0 [ 311.736066] __should_failslab+0x124/0x180 [ 311.740285] should_failslab+0x9/0x14 [ 311.744066] kmem_cache_alloc+0x2be/0x730 [ 311.748203] ? find_inode.isra.19+0xc3/0x210 [ 311.752596] ? do_raw_spin_lock+0xc1/0x200 [ 311.756818] ? v9fs_blank_wstat+0x3a0/0x3a0 [ 311.761121] v9fs_alloc_inode+0x3d/0x150 [ 311.765183] alloc_inode+0x63/0x190 [ 311.768820] iget5_locked+0x124/0x1c0 [ 311.772619] ? v9fs_vfs_setattr+0xbb0/0xbb0 [ 311.776924] ? unixmode2p9mode+0x240/0x240 [ 311.781142] ? unixmode2p9mode+0x240/0x240 [ 311.785361] v9fs_inode_from_fid+0x172/0x350 [ 311.789752] ? do_raw_spin_unlock+0xa7/0x2f0 [ 311.794147] ? v9fs_vfs_getattr+0x270/0x270 [ 311.798477] v9fs_vfs_lookup+0x3f5/0x4a0 [ 311.802518] ? d_alloc+0x290/0x380 [ 311.806041] ? v9fs_vfs_create+0x130/0x130 [ 311.810259] ? lock_rename+0x236/0x290 [ 311.814135] __lookup_hash+0x12e/0x190 [ 311.818007] do_renameat2+0x6c1/0x1180 [ 311.821921] ? user_path_create+0x40/0x40 [ 311.826051] ? __lock_is_held+0xb5/0x140 [ 311.830104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.835626] ? check_preemption_disabled+0x48/0x200 [ 311.840638] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.846162] ? do_syscall_64+0x9a/0x820 [ 311.850128] ? do_syscall_64+0x9a/0x820 [ 311.854089] ? trace_hardirqs_on+0xbd/0x310 [ 311.858396] ? __ia32_sys_read+0xb0/0xb0 [ 311.862445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.867798] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 311.873239] __x64_sys_rename+0x5e/0x80 [ 311.877200] do_syscall_64+0x1b9/0x820 [ 311.881074] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.886427] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.891345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.896185] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.901194] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.906197] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.911203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.916036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.921211] RIP: 0033:0x457569 [ 311.924393] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.943280] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 08:21:58 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x2200, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 311.950985] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 311.958241] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 311.965491] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 311.972746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 311.980001] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:58 executing program 2 (fault-call:14 fault-nth:16): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:58 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000540)=""/4096) fchmod(r0, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:21:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x80f) 08:21:58 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x805) 08:21:58 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x4800, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 312.171830] FAULT_INJECTION: forcing a failure. [ 312.171830] name failslab, interval 1, probability 0, space 0, times 0 [ 312.186697] CPU: 0 PID: 11049 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 312.193991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.203373] Call Trace: [ 312.205970] dump_stack+0x1c4/0x2b4 [ 312.209609] ? dump_stack_print_info.cold.2+0x52/0x52 [ 312.214808] ? find_held_lock+0x36/0x1c0 [ 312.218901] should_fail.cold.4+0xa/0x17 [ 312.222975] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.228088] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 312.233892] ? kasan_check_read+0x11/0x20 [ 312.238041] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 312.243318] ? rcu_bh_qs+0xc0/0xc0 [ 312.246859] ? rcu_bh_qs+0xc0/0xc0 [ 312.250411] ? unwind_dump+0x190/0x190 [ 312.254300] ? graph_lock+0x170/0x170 [ 312.258112] ? is_bpf_text_address+0xd3/0x170 [ 312.262622] ? kernel_text_address+0x79/0xf0 [ 312.267040] ? __lock_is_held+0xb5/0x140 [ 312.271117] ? ___might_sleep+0x1ed/0x300 [ 312.275280] ? arch_local_save_flags+0x40/0x40 [ 312.279864] ? save_stack+0x43/0xd0 [ 312.283493] ? kasan_kmalloc+0xc7/0xe0 [ 312.287384] ? kasan_slab_alloc+0x12/0x20 [ 312.291536] ? kmem_cache_alloc+0x12e/0x730 [ 312.295858] ? v9fs_alloc_inode+0x3d/0x150 [ 312.300106] __should_failslab+0x124/0x180 [ 312.304360] should_failslab+0x9/0x14 [ 312.308178] kmem_cache_alloc+0x2be/0x730 [ 312.312338] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 312.317358] ? map_id_range_down+0x1ee/0x430 [ 312.321786] new_inode_smack+0x20/0xb0 [ 312.325682] smack_inode_alloc_security+0x92/0x100 [ 312.330623] security_inode_alloc+0x73/0xd0 [ 312.334952] inode_init_always+0x68f/0xd80 [ 312.339190] ? __address_space_init_once+0x240/0x240 [ 312.344300] ? __ia32_sys_membarrier+0x150/0x150 [ 312.349562] ? rcu_read_lock_sched_held+0x108/0x120 [ 312.354582] ? kmem_cache_alloc+0x33a/0x730 [ 312.358923] ? find_inode.isra.19+0xc3/0x210 [ 312.363335] ? do_raw_spin_lock+0xc1/0x200 [ 312.367576] ? v9fs_blank_wstat+0x3a0/0x3a0 [ 312.371904] alloc_inode+0x80/0x190 [ 312.375534] iget5_locked+0x124/0x1c0 [ 312.379348] ? v9fs_vfs_setattr+0xbb0/0xbb0 [ 312.383671] ? unixmode2p9mode+0x240/0x240 [ 312.387907] ? unixmode2p9mode+0x240/0x240 [ 312.392152] v9fs_inode_from_fid+0x172/0x350 [ 312.396564] ? do_raw_spin_unlock+0xa7/0x2f0 [ 312.400975] ? v9fs_vfs_getattr+0x270/0x270 [ 312.405305] v9fs_vfs_lookup+0x3f5/0x4a0 [ 312.409371] ? d_alloc+0x290/0x380 [ 312.412913] ? v9fs_vfs_create+0x130/0x130 [ 312.417150] ? lock_rename+0x236/0x290 [ 312.421022] __lookup_hash+0x12e/0x190 [ 312.424892] do_renameat2+0x6c1/0x1180 [ 312.428781] ? user_path_create+0x40/0x40 [ 312.432913] ? __lock_is_held+0xb5/0x140 [ 312.437003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.442522] ? check_preemption_disabled+0x48/0x200 [ 312.447539] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 312.453080] ? do_syscall_64+0x9a/0x820 [ 312.457054] ? do_syscall_64+0x9a/0x820 [ 312.461011] ? trace_hardirqs_on+0xbd/0x310 [ 312.465315] ? __ia32_sys_read+0xb0/0xb0 [ 312.469367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.474723] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 312.480158] __x64_sys_rename+0x5e/0x80 [ 312.484127] do_syscall_64+0x1b9/0x820 [ 312.487995] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.493343] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.498264] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.503100] ? trace_hardirqs_on_caller+0x310/0x310 [ 312.508140] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 312.513145] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.518157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.522986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.528155] RIP: 0033:0x457569 [ 312.531345] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.550235] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 312.557922] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 312.565169] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 08:21:58 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x7, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 312.572429] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 312.579680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 312.586952] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:58 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x1000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:58 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x7}, 0x0) 08:21:58 executing program 2 (fault-call:14 fault-nth:17): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') [ 312.748836] FAULT_INJECTION: forcing a failure. [ 312.748836] name failslab, interval 1, probability 0, space 0, times 0 [ 312.770499] CPU: 0 PID: 11064 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 312.777783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.787130] Call Trace: [ 312.789721] dump_stack+0x1c4/0x2b4 [ 312.793352] ? dump_stack_print_info.cold.2+0x52/0x52 08:21:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x80d) 08:21:58 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x80d) [ 312.798545] ? find_held_lock+0x36/0x1c0 [ 312.802618] should_fail.cold.4+0xa/0x17 [ 312.806689] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.811808] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 312.817602] ? kasan_check_read+0x11/0x20 [ 312.821750] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 312.827025] ? rcu_bh_qs+0xc0/0xc0 [ 312.830570] ? rcu_bh_qs+0xc0/0xc0 [ 312.834117] ? unwind_dump+0x190/0x190 [ 312.837998] ? graph_lock+0x170/0x170 [ 312.841805] ? is_bpf_text_address+0xd3/0x170 [ 312.846300] ? kernel_text_address+0x79/0xf0 [ 312.850709] ? __lock_is_held+0xb5/0x140 [ 312.854766] ? ___might_sleep+0x1ed/0x300 [ 312.858912] ? arch_local_save_flags+0x40/0x40 [ 312.863492] ? save_stack+0x43/0xd0 [ 312.867104] ? kasan_kmalloc+0xc7/0xe0 [ 312.870985] ? kasan_slab_alloc+0x12/0x20 [ 312.875127] ? kmem_cache_alloc+0x12e/0x730 [ 312.879521] ? v9fs_alloc_inode+0x3d/0x150 [ 312.883748] __should_failslab+0x124/0x180 [ 312.887975] should_failslab+0x9/0x14 [ 312.891776] kmem_cache_alloc+0x2be/0x730 [ 312.895947] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 312.900956] ? map_id_range_down+0x1ee/0x430 [ 312.905355] new_inode_smack+0x20/0xb0 [ 312.909237] smack_inode_alloc_security+0x92/0x100 [ 312.914161] security_inode_alloc+0x73/0xd0 [ 312.918471] inode_init_always+0x68f/0xd80 [ 312.922696] ? __address_space_init_once+0x240/0x240 [ 312.927781] ? __ia32_sys_membarrier+0x150/0x150 [ 312.932524] ? rcu_read_lock_sched_held+0x108/0x120 [ 312.937538] ? kmem_cache_alloc+0x33a/0x730 [ 312.941851] ? do_raw_spin_lock+0xc1/0x200 [ 312.946092] ? v9fs_blank_wstat+0x3a0/0x3a0 [ 312.950405] alloc_inode+0x80/0x190 [ 312.954023] iget5_locked+0x124/0x1c0 [ 312.957818] ? v9fs_vfs_setattr+0xbb0/0xbb0 [ 312.962124] ? unixmode2p9mode+0x240/0x240 [ 312.966336] ? unixmode2p9mode+0x240/0x240 [ 312.970560] v9fs_inode_from_fid+0x172/0x350 [ 312.974962] ? do_raw_spin_unlock+0xa7/0x2f0 [ 312.979370] ? v9fs_vfs_getattr+0x270/0x270 [ 312.983694] v9fs_vfs_lookup+0x3f5/0x4a0 [ 312.987730] ? d_alloc+0x290/0x380 [ 312.991251] ? v9fs_vfs_create+0x130/0x130 [ 312.995466] ? lock_rename+0x236/0x290 [ 312.999353] __lookup_hash+0x12e/0x190 [ 313.003222] do_renameat2+0x6c1/0x1180 [ 313.007116] ? user_path_create+0x40/0x40 [ 313.011250] ? __lock_is_held+0xb5/0x140 [ 313.015307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.020841] ? check_preemption_disabled+0x48/0x200 [ 313.025857] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 313.031388] ? do_syscall_64+0x9a/0x820 [ 313.035359] ? do_syscall_64+0x9a/0x820 [ 313.039328] ? trace_hardirqs_on+0xbd/0x310 [ 313.043642] ? __ia32_sys_read+0xb0/0xb0 [ 313.047694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.053038] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 313.058487] __x64_sys_rename+0x5e/0x80 [ 313.062449] do_syscall_64+0x1b9/0x820 [ 313.066321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.071668] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.076590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.081428] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.086426] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.091421] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.096418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.101242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.106417] RIP: 0033:0x457569 [ 313.109594] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.128471] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 313.136159] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 313.143409] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 08:21:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x3f000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:59 executing program 2 (fault-call:14 fault-nth:18): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') [ 313.150657] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 313.157902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 313.165151] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:59 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) fstat(r0, &(0x7f0000000340)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ppoll(&(0x7f00000000c0)=[{r3, 0x400}, {r3, 0x40}, {r2, 0x1066}, {r3, 0x2240}, {r2, 0x20}, {r3, 0x1005}, {r1, 0x400}, {r4, 0x80}, {r2, 0x400}], 0x9, &(0x7f0000000140)={0x77359400}, &(0x7f0000000300)={0x100000001}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)=0x801) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffffa, 0x200080) gettid() 08:21:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x805) [ 313.283819] FAULT_INJECTION: forcing a failure. [ 313.283819] name failslab, interval 1, probability 0, space 0, times 0 [ 313.309837] CPU: 0 PID: 11080 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 313.317140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.326490] Call Trace: [ 313.329094] dump_stack+0x1c4/0x2b4 [ 313.332728] ? dump_stack_print_info.cold.2+0x52/0x52 [ 313.337941] ? __lock_acquire+0x7ec/0x4ec0 [ 313.342181] ? check_preemption_disabled+0x48/0x200 [ 313.347208] should_fail.cold.4+0xa/0x17 [ 313.351280] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.356383] ? mark_held_locks+0x130/0x130 [ 313.360615] ? kasan_check_write+0x14/0x20 [ 313.364854] ? graph_lock+0x170/0x170 [ 313.368671] ? graph_lock+0x170/0x170 [ 313.372474] ? mark_held_locks+0x130/0x130 [ 313.376719] ? __kernel_text_address+0xd/0x40 [ 313.381216] ? unwind_get_return_address+0x61/0xa0 [ 313.386149] ? find_held_lock+0x36/0x1c0 [ 313.390218] ? __lock_is_held+0xb5/0x140 [ 313.394292] ? ___might_sleep+0x1ed/0x300 [ 313.398441] ? arch_local_save_flags+0x40/0x40 [ 313.403052] __should_failslab+0x124/0x180 [ 313.407291] should_failslab+0x9/0x14 [ 313.411088] kmem_cache_alloc+0x2be/0x730 [ 313.411111] __d_alloc+0xc8/0xcc0 [ 313.411126] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 313.418695] ? d_alloc_parallel+0x1f40/0x1f40 [ 313.418706] ? d_lookup+0x269/0x340 [ 313.418717] ? d_lookup+0x269/0x340 [ 313.418732] ? lockdep_hardirqs_on+0x421/0x5c0 [ 313.418746] ? lookup_dcache+0x22/0x140 [ 313.418761] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 313.418781] ? v9fs_fid_find+0x2f0/0x2f0 [ 313.418799] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 313.418816] d_alloc+0x96/0x380 [ 313.418826] ? __d_lookup+0x9e0/0x9e0 [ 313.418839] ? __d_alloc+0xcc0/0xcc0 [ 313.418849] ? lock_rename+0x236/0x290 [ 313.418889] __lookup_hash+0xd9/0x190 [ 313.477010] do_renameat2+0x76a/0x1180 [ 313.480924] ? user_path_create+0x40/0x40 [ 313.485077] ? __lock_is_held+0xb5/0x140 [ 313.489141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.494681] ? check_preemption_disabled+0x48/0x200 [ 313.499743] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 313.505288] ? do_syscall_64+0x9a/0x820 [ 313.509263] ? do_syscall_64+0x9a/0x820 [ 313.513405] ? trace_hardirqs_on+0xbd/0x310 [ 313.517727] ? __ia32_sys_read+0xb0/0xb0 [ 313.521790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.527158] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 313.532617] __x64_sys_rename+0x5e/0x80 [ 313.536603] do_syscall_64+0x1b9/0x820 [ 313.540499] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.545869] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.550800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.555646] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.560667] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.565688] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.570713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.575560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.580746] RIP: 0033:0x457569 08:21:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xd0ffffff00000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 313.583936] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.602842] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 313.610577] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 313.617846] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 313.625107] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 313.632373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 313.639631] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:21:59 executing program 2 (fault-call:14 fault-nth:19): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:21:59 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x804) 08:21:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xe4ffffff00000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:21:59 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 313.809616] FAULT_INJECTION: forcing a failure. [ 313.809616] name failslab, interval 1, probability 0, space 0, times 0 [ 313.820958] CPU: 0 PID: 11105 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 313.828232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.837577] Call Trace: [ 313.840155] dump_stack+0x1c4/0x2b4 [ 313.843767] ? dump_stack_print_info.cold.2+0x52/0x52 [ 313.848967] should_fail.cold.4+0xa/0x17 [ 313.853042] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.858128] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 313.863912] ? graph_lock+0x170/0x170 [ 313.867697] ? print_usage_bug+0xc0/0xc0 [ 313.871752] ? __lock_acquire+0x7ec/0x4ec0 [ 313.875981] ? __lock_is_held+0xb5/0x140 [ 313.880032] ? __account_cfs_rq_runtime+0x790/0x790 [ 313.885040] ? __lock_acquire+0x7ec/0x4ec0 [ 313.889252] ? graph_lock+0x170/0x170 [ 313.893033] ? graph_lock+0x170/0x170 [ 313.896834] __should_failslab+0x124/0x180 [ 313.901052] should_failslab+0x9/0x14 [ 313.904833] kmem_cache_alloc+0x47/0x730 [ 313.908876] ? print_usage_bug+0xc0/0xc0 [ 313.912915] ? __debug_object_init+0x57d/0x1290 [ 313.917572] ? lock_downgrade+0x900/0x900 [ 313.921703] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 313.927397] radix_tree_extend+0x294/0x660 [ 313.931619] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 313.937490] ? find_held_lock+0x36/0x1c0 [ 313.941542] ? graph_lock+0x170/0x170 [ 313.945334] idr_get_free+0x83d/0xec0 [ 313.949123] ? find_held_lock+0x36/0x1c0 [ 313.953185] ? ida_pre_get+0x130/0x130 [ 313.957059] ? lock_downgrade+0x900/0x900 [ 313.961199] ? trace_hardirqs_off+0xb8/0x310 [ 313.965591] ? kasan_check_read+0x11/0x20 [ 313.969747] ? do_raw_spin_unlock+0xa7/0x2f0 [ 313.974156] ? trace_hardirqs_on+0x310/0x310 [ 313.978548] ? kasan_check_write+0x14/0x20 [ 313.982773] ? do_raw_spin_lock+0xc1/0x200 [ 313.987029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.992576] ? check_preemption_disabled+0x48/0x200 [ 313.997590] ? trace_hardirqs_off+0xb8/0x310 [ 314.001985] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 314.007254] ? debug_object_deactivate+0x450/0x450 [ 314.012170] idr_alloc_u32+0x201/0x3f0 [ 314.016046] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 314.020873] ? p9_idpool_get+0x23/0x90 [ 314.024763] idr_alloc+0x111/0x1b0 [ 314.028293] ? idr_alloc_u32+0x3f0/0x3f0 [ 314.032352] ? do_raw_spin_lock+0xc1/0x200 [ 314.036589] p9_idpool_get+0x3d/0x90 [ 314.040292] p9_client_prepare_req.part.8+0xec/0xc30 [ 314.045385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 314.050904] ? delete_node+0x30e/0xd20 [ 314.054789] ? p9_free_req.isra.7+0x140/0x140 [ 314.059267] ? idr_destroy+0x1c0/0x1c0 [ 314.063140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.068663] ? replace_slot+0x151/0x520 [ 314.072625] p9_client_rpc+0x1c2/0x1480 [ 314.076596] ? graph_lock+0x170/0x170 [ 314.080388] ? p9_client_prepare_req.part.8+0xc30/0xc30 [ 314.085729] ? print_usage_bug+0xc0/0xc0 [ 314.089775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.095295] ? node_tag_set+0xc6/0x170 [ 314.099173] ? find_held_lock+0x36/0x1c0 [ 314.103218] ? graph_lock+0x170/0x170 [ 314.107016] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 314.112102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.117621] ? check_preemption_disabled+0x48/0x200 [ 314.122617] ? check_preemption_disabled+0x48/0x200 [ 314.127628] ? __lock_is_held+0xb5/0x140 [ 314.131692] p9_client_clunk+0x93/0x180 [ 314.135670] p9_client_walk+0x5d6/0xb30 [ 314.139653] ? match_held_lock+0x291/0x8d0 [ 314.143871] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 314.149473] ? v9fs_show_options+0xb0/0x7e0 [ 314.153777] ? d_alloc+0x28b/0x380 [ 314.157297] ? lock_downgrade+0x85c/0x900 [ 314.161432] ? v9fs_fid_add+0x240/0x240 [ 314.165392] ? kasan_check_read+0x11/0x20 [ 314.169522] ? do_raw_spin_unlock+0xa7/0x2f0 [ 314.173908] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 314.178573] v9fs_vfs_lookup+0x1f7/0x4a0 [ 314.182629] ? v9fs_vfs_lookup+0x1f7/0x4a0 [ 314.186863] ? d_alloc+0x290/0x380 [ 314.190392] ? v9fs_vfs_create+0x130/0x130 [ 314.194616] ? lock_rename+0x236/0x290 [ 314.198526] __lookup_hash+0x12e/0x190 [ 314.202404] do_renameat2+0x76a/0x1180 [ 314.206282] ? user_path_create+0x40/0x40 [ 314.210411] ? __lock_is_held+0xb5/0x140 [ 314.214457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.219987] ? check_preemption_disabled+0x48/0x200 [ 314.225000] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 314.230519] ? do_syscall_64+0x9a/0x820 [ 314.234473] ? do_syscall_64+0x9a/0x820 [ 314.238432] ? trace_hardirqs_on+0xbd/0x310 [ 314.242729] ? __ia32_sys_read+0xb0/0xb0 [ 314.246771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.252125] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 314.257561] __x64_sys_rename+0x5e/0x80 [ 314.261521] do_syscall_64+0x1b9/0x820 [ 314.265398] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.270754] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.275672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.280499] ? trace_hardirqs_on_caller+0x310/0x310 [ 314.285497] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 314.290494] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.295499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.300431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.305598] RIP: 0033:0x457569 [ 314.308785] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.327679] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 314.335379] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 314.342628] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 314.349877] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 08:22:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x30000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:00 executing program 2 (fault-call:14 fault-nth:20): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') [ 314.357140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 314.364406] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:00 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000440)={0x2f, 0x6, 0x0, {0x0, 0x2, 0x6, 0x0, ':eth1]'}}, 0x2f) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$SG_IO(r1, 0x2285, &(0x7f0000000540)={0x53, 0xffffffffffffffff, 0x6e, 0x2, @scatter={0x1, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}]}, &(0x7f0000000100)="9ffe47db0cba34b8da7320609ab05358987d35ada0d5a9e7d8b2ae9ec46a79fa3731d6bcbe87a1f611146a1d187851e714a0657ad44ec37d1c8d981d30d5da0853e90c6780fac94d2abd9259247a9bf3b9b0ae2b08411cca6fab621cf60cc5d20701c309a3abf3c8ae84b81069a7", &(0x7f0000000300)=""/204, 0x4220, 0x20, 0x3, &(0x7f0000000400)}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x810) 08:22:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x6800, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:00 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) r1 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='+vboxnet0selinux/@()\x00', 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, r1, 0x7, 0x6, r2) [ 314.521348] FAULT_INJECTION: forcing a failure. [ 314.521348] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.533185] CPU: 0 PID: 11121 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 314.540445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.549804] Call Trace: [ 314.552384] dump_stack+0x1c4/0x2b4 [ 314.556002] ? dump_stack_print_info.cold.2+0x52/0x52 [ 314.561182] ? arch_local_save_flags+0x40/0x40 [ 314.565753] should_fail.cold.4+0xa/0x17 [ 314.569805] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.574907] ? graph_lock+0x170/0x170 [ 314.578686] ? lock_downgrade+0x900/0x900 [ 314.582814] ? check_preemption_disabled+0x48/0x200 [ 314.587815] ? kasan_check_read+0x11/0x20 [ 314.591959] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 314.597221] ? find_held_lock+0x36/0x1c0 [ 314.601263] ? graph_lock+0x170/0x170 [ 314.605047] ? get_mem_cgroup_from_mm+0x1e9/0x440 [ 314.609873] ? lock_downgrade+0x900/0x900 [ 314.614005] ? check_preemption_disabled+0x48/0x200 [ 314.619007] ? find_held_lock+0x36/0x1c0 [ 314.623053] ? rcu_read_unlock+0x16/0x60 [ 314.627098] __alloc_pages_nodemask+0x34b/0xde0 [ 314.631762] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 314.637539] ? kasan_check_read+0x11/0x20 [ 314.641668] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 314.646664] ? __lock_is_held+0xb5/0x140 [ 314.650722] ? ___might_sleep+0x1ed/0x300 [ 314.654851] ? trace_hardirqs_off+0xb8/0x310 [ 314.659243] cache_grow_begin+0x91/0x8c0 [ 314.663288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 314.668826] ? check_preemption_disabled+0x48/0x200 [ 314.673826] kmem_cache_alloc+0x665/0x730 [ 314.677965] __d_alloc+0xc8/0xcc0 [ 314.681402] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 314.686401] ? d_alloc_parallel+0x1f40/0x1f40 [ 314.690873] ? d_lookup+0x269/0x340 [ 314.694481] ? d_lookup+0x269/0x340 [ 314.698091] ? lockdep_hardirqs_on+0x421/0x5c0 [ 314.702655] ? lookup_dcache+0x22/0x140 [ 314.706612] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 314.712046] ? v9fs_fid_find+0x2f0/0x2f0 [ 314.716092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 314.721090] d_alloc+0x96/0x380 [ 314.724352] ? __d_lookup+0x9e0/0x9e0 [ 314.728135] ? __d_alloc+0xcc0/0xcc0 [ 314.731828] ? lock_rename+0x236/0x290 [ 314.735702] __lookup_hash+0xd9/0x190 [ 314.739486] do_renameat2+0x76a/0x1180 [ 314.743364] ? user_path_create+0x40/0x40 [ 314.747494] ? __lock_is_held+0xb5/0x140 [ 314.751538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.757054] ? check_preemption_disabled+0x48/0x200 [ 314.762060] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 314.767591] ? do_syscall_64+0x9a/0x820 [ 314.771668] ? do_syscall_64+0x9a/0x820 [ 314.775633] ? trace_hardirqs_on+0xbd/0x310 [ 314.779954] ? __ia32_sys_read+0xb0/0xb0 [ 314.784003] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.789348] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 314.794781] __x64_sys_rename+0x5e/0x80 [ 314.798740] do_syscall_64+0x1b9/0x820 [ 314.802611] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.807964] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.812873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.817698] ? trace_hardirqs_on_caller+0x310/0x310 [ 314.822693] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 314.827689] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.832697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.837531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.842703] RIP: 0033:0x457569 [ 314.845881] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.864759] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 08:22:00 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x100000000000000}, 0x0) [ 314.872448] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 314.879697] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 314.886942] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 314.894189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 314.901440] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x2200000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:01 executing program 2 (fault-call:14 fault-nth:21): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x56000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x50000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 315.145159] FAULT_INJECTION: forcing a failure. [ 315.145159] name failslab, interval 1, probability 0, space 0, times 0 [ 315.156390] CPU: 1 PID: 11140 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 315.163669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.173017] Call Trace: [ 315.175609] dump_stack+0x1c4/0x2b4 [ 315.179231] ? dump_stack_print_info.cold.2+0x52/0x52 [ 315.184418] ? find_held_lock+0x36/0x1c0 [ 315.188477] should_fail.cold.4+0xa/0x17 [ 315.192522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.197607] ? find_held_lock+0x36/0x1c0 [ 315.201657] ? print_usage_bug+0xc0/0xc0 [ 315.205705] ? print_usage_bug+0xc0/0xc0 [ 315.209751] ? __lock_acquire+0x7ec/0x4ec0 [ 315.213969] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 315.219753] ? __lock_is_held+0xb5/0x140 [ 315.223836] ? __lock_acquire+0x7ec/0x4ec0 [ 315.228056] ? graph_lock+0x170/0x170 [ 315.231837] ? graph_lock+0x170/0x170 [ 315.235621] ? __account_cfs_rq_runtime+0x790/0x790 [ 315.240632] __should_failslab+0x124/0x180 [ 315.244854] should_failslab+0x9/0x14 [ 315.248637] kmem_cache_alloc+0x47/0x730 [ 315.252697] ? print_usage_bug+0xc0/0xc0 [ 315.256736] ? __debug_object_init+0x57d/0x1290 [ 315.261386] ? lock_downgrade+0x900/0x900 [ 315.265539] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 315.271238] radix_tree_extend+0x294/0x660 [ 315.275462] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 315.281328] ? find_held_lock+0x36/0x1c0 [ 315.285376] ? graph_lock+0x170/0x170 [ 315.289169] idr_get_free+0x83d/0xec0 [ 315.292962] ? find_held_lock+0x36/0x1c0 [ 315.297023] ? ida_pre_get+0x130/0x130 [ 315.300901] ? lock_downgrade+0x900/0x900 [ 315.305056] ? trace_hardirqs_off+0xb8/0x310 [ 315.309444] ? kasan_check_read+0x11/0x20 [ 315.313577] ? do_raw_spin_unlock+0xa7/0x2f0 [ 315.317966] ? trace_hardirqs_on+0x310/0x310 [ 315.322376] ? kasan_check_write+0x14/0x20 [ 315.326597] ? do_raw_spin_lock+0xc1/0x200 [ 315.330821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.336342] ? check_preemption_disabled+0x48/0x200 [ 315.341341] ? trace_hardirqs_off+0xb8/0x310 [ 315.345739] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 315.350997] ? debug_object_deactivate+0x450/0x450 [ 315.355911] idr_alloc_u32+0x201/0x3f0 [ 315.359781] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 315.364605] ? p9_idpool_get+0x23/0x90 [ 315.368479] idr_alloc+0x111/0x1b0 [ 315.372004] ? idr_alloc_u32+0x3f0/0x3f0 [ 315.376048] ? do_raw_spin_lock+0xc1/0x200 [ 315.380267] p9_idpool_get+0x3d/0x90 [ 315.383963] p9_client_prepare_req.part.8+0xec/0xc30 [ 315.389047] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.394561] ? delete_node+0x30e/0xd20 [ 315.398433] ? p9_free_req.isra.7+0x140/0x140 [ 315.402914] ? idr_destroy+0x1c0/0x1c0 [ 315.406805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.412321] ? replace_slot+0x151/0x520 [ 315.416283] p9_client_rpc+0x1c2/0x1480 [ 315.420241] ? graph_lock+0x170/0x170 [ 315.424028] ? p9_client_prepare_req.part.8+0xc30/0xc30 [ 315.429393] ? print_usage_bug+0xc0/0xc0 [ 315.433440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.438984] ? node_tag_set+0xc6/0x170 [ 315.442861] ? find_held_lock+0x36/0x1c0 [ 315.446927] ? graph_lock+0x170/0x170 [ 315.450711] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 315.455796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.461316] ? check_preemption_disabled+0x48/0x200 [ 315.466313] ? check_preemption_disabled+0x48/0x200 [ 315.471331] ? __lock_is_held+0xb5/0x140 [ 315.475383] p9_client_clunk+0x93/0x180 [ 315.479343] p9_client_walk+0x5d6/0xb30 [ 315.483300] ? match_held_lock+0x291/0x8d0 [ 315.487536] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 315.493142] ? v9fs_show_options+0xb0/0x7e0 [ 315.497445] ? d_alloc+0x28b/0x380 [ 315.500968] ? lock_downgrade+0x85c/0x900 [ 315.505100] ? v9fs_fid_add+0x240/0x240 [ 315.509074] ? kasan_check_read+0x11/0x20 [ 315.513692] ? do_raw_spin_unlock+0xa7/0x2f0 [ 315.518083] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 315.522657] v9fs_vfs_lookup+0x1f7/0x4a0 [ 315.526696] ? v9fs_vfs_lookup+0x1f7/0x4a0 [ 315.530909] ? d_alloc+0x290/0x380 [ 315.534431] ? v9fs_vfs_create+0x130/0x130 [ 315.538647] ? lock_rename+0x236/0x290 [ 315.542521] __lookup_hash+0x12e/0x190 [ 315.546394] do_renameat2+0x76a/0x1180 [ 315.550271] ? user_path_create+0x40/0x40 [ 315.554402] ? __lock_is_held+0xb5/0x140 [ 315.558456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.563976] ? check_preemption_disabled+0x48/0x200 [ 315.568993] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 315.574512] ? do_syscall_64+0x9a/0x820 [ 315.578468] ? do_syscall_64+0x9a/0x820 [ 315.582428] ? trace_hardirqs_on+0xbd/0x310 [ 315.586733] ? __ia32_sys_read+0xb0/0xb0 [ 315.590772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.596115] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 315.601552] __x64_sys_rename+0x5e/0x80 [ 315.605513] do_syscall_64+0x1b9/0x820 [ 315.609386] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 315.614731] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.619645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.624469] ? trace_hardirqs_on_caller+0x310/0x310 [ 315.629465] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 315.634462] ? prepare_exit_to_usermode+0x291/0x3b0 [ 315.639465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.644294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.649466] RIP: 0033:0x457569 [ 315.652661] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.671540] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 315.679230] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 315.686481] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 315.693731] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 315.700991] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 315.708240] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x2000) 08:22:01 executing program 2 (fault-call:14 fault-nth:22): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x3000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0xfffffffffffffffd, 0xa50, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x6, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000540)=""/4096) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:01 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f0000000300)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f") r0 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x800) pread64(r0, &(0x7f00000000c0)=""/97, 0x61, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) getitimer(0x3, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f00000002c0)=0x8001) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000003c0)=0x2, 0x4) 08:22:01 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x700000000000000}, 0x0) [ 315.881656] FAULT_INJECTION: forcing a failure. [ 315.881656] name failslab, interval 1, probability 0, space 0, times 0 08:22:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x30, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 315.932019] CPU: 0 PID: 11157 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 315.939317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.948676] Call Trace: [ 315.951256] dump_stack+0x1c4/0x2b4 [ 315.954878] ? dump_stack_print_info.cold.2+0x52/0x52 [ 315.960167] ? kernel_text_address+0x79/0xf0 [ 315.964562] ? __kernel_text_address+0xd/0x40 [ 315.969055] should_fail.cold.4+0xa/0x17 [ 315.973100] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.978189] ? __lock_acquire+0x7ec/0x4ec0 [ 315.982404] ? graph_lock+0x170/0x170 [ 315.986184] ? save_stack+0x43/0xd0 [ 315.989790] ? kasan_kmalloc+0xc7/0xe0 [ 315.993658] ? graph_lock+0x170/0x170 [ 315.997440] ? d_alloc+0x96/0x380 [ 316.000879] ? graph_lock+0x170/0x170 [ 316.004665] ? find_held_lock+0x36/0x1c0 [ 316.008710] ? __lock_is_held+0xb5/0x140 [ 316.012758] ? ___might_sleep+0x1ed/0x300 [ 316.016888] ? v9fs_fid_find+0x24b/0x2f0 [ 316.020944] ? arch_local_save_flags+0x40/0x40 [ 316.025504] ? lock_downgrade+0x900/0x900 [ 316.029639] __should_failslab+0x124/0x180 [ 316.033857] should_failslab+0x9/0x14 [ 316.037639] kmem_cache_alloc_trace+0x2d7/0x750 [ 316.042288] ? do_raw_spin_lock+0xc1/0x200 [ 316.046510] p9_fid_create+0x49/0x2b0 [ 316.050293] p9_client_walk+0x124/0xb30 [ 316.054255] ? match_held_lock+0x291/0x8d0 [ 316.058476] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 316.064085] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 316.069077] ? d_alloc+0x28b/0x380 [ 316.072599] ? lock_downgrade+0x85c/0x900 [ 316.076733] ? v9fs_fid_add+0x240/0x240 [ 316.080709] ? kasan_check_read+0x11/0x20 [ 316.084843] ? do_raw_spin_unlock+0xa7/0x2f0 [ 316.089240] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 316.093809] v9fs_vfs_lookup+0x1f7/0x4a0 [ 316.097864] ? v9fs_vfs_lookup+0x1f7/0x4a0 [ 316.102076] ? d_alloc+0x290/0x380 [ 316.105668] ? v9fs_vfs_create+0x130/0x130 [ 316.109900] ? lock_rename+0x236/0x290 [ 316.113776] __lookup_hash+0x12e/0x190 [ 316.117645] do_renameat2+0x76a/0x1180 [ 316.121543] ? user_path_create+0x40/0x40 [ 316.125673] ? __lock_is_held+0xb5/0x140 [ 316.129722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.135243] ? check_preemption_disabled+0x48/0x200 [ 316.140248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.145771] ? do_syscall_64+0x9a/0x820 [ 316.149725] ? do_syscall_64+0x9a/0x820 [ 316.153687] ? trace_hardirqs_on+0xbd/0x310 [ 316.157988] ? __ia32_sys_read+0xb0/0xb0 [ 316.162030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.167371] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 316.172817] __x64_sys_rename+0x5e/0x80 [ 316.176773] do_syscall_64+0x1b9/0x820 [ 316.180640] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.185986] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.190895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.195717] ? trace_hardirqs_on_caller+0x310/0x310 [ 316.200714] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 316.205712] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.210710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.215536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.220706] RIP: 0033:0x457569 [ 316.223883] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.242777] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 316.250472] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 316.257721] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 316.264970] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 316.272229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 316.279478] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:02 executing program 2 (fault-call:14 fault-nth:23): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xe00000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x802) 08:22:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:02 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x16}, 0x7}}, 0x5, 0x0, 0xfff, 0xfff, 0x48}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000300)={r1, 0x8a, "cf9f6fcb9ad6bd468adb6a1b06d2df544cc3f1135e3dfdda4672a7b737e1d5cb4ba6530e78460d593d5877ff4bc980f3964eb8ac666439e194da8542660075b1ea87cee3a9e1013b20ecd1920d26bfca7069419ac5f6ae77bf9427f07c691870fcff110c48b840161b5863aa2e1c8b66fa365657c8fd93db51a20b06b0d7e5815f9c854af643fd71e0bd"}, &(0x7f00000003c0)=0x92) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x801) 08:22:02 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000100)=0x6) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)=0x801) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={r0, 0x0, 0x10000, 0x4, 0x3970f9e1}) 08:22:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x6000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 316.466569] FAULT_INJECTION: forcing a failure. [ 316.466569] name failslab, interval 1, probability 0, space 0, times 0 [ 316.520039] CPU: 1 PID: 11182 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 316.527352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.536698] Call Trace: [ 316.539297] dump_stack+0x1c4/0x2b4 [ 316.542939] ? dump_stack_print_info.cold.2+0x52/0x52 [ 316.548145] should_fail.cold.4+0xa/0x17 [ 316.552211] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.557322] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 316.562602] ? graph_lock+0x170/0x170 [ 316.566398] ? print_usage_bug+0xc0/0xc0 [ 316.570471] ? graph_lock+0x170/0x170 [ 316.574267] ? graph_lock+0x170/0x170 [ 316.578075] ? find_held_lock+0x36/0x1c0 [ 316.582154] ? __lock_is_held+0xb5/0x140 [ 316.586234] ? ___might_sleep+0x1ed/0x300 [ 316.590381] ? arch_local_save_flags+0x40/0x40 [ 316.594991] __should_failslab+0x124/0x180 [ 316.599225] should_failslab+0x9/0x14 [ 316.603030] kmem_cache_alloc_trace+0x2d7/0x750 [ 316.607717] ? _raw_spin_unlock+0x2c/0x50 [ 316.611868] p9_fid_create+0x49/0x2b0 [ 316.615673] p9_client_walk+0x124/0xb30 [ 316.619643] ? smk_access_entry+0x310/0x310 [ 316.623967] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 316.629593] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 316.634610] ? graph_lock+0x170/0x170 [ 316.638406] ? graph_lock+0x170/0x170 [ 316.642205] ? v9fs_fid_add+0x240/0x240 [ 316.646178] ? __lock_is_held+0xb5/0x140 [ 316.650238] ? lock_acquire+0x1ed/0x520 [ 316.654208] ? lock_two_nondirectories+0xdd/0x120 [ 316.659057] v9fs_vfs_rename+0x239/0xd30 [ 316.663114] ? v9fs_vfs_rename+0x239/0xd30 [ 316.667346] ? lockref_get+0x42/0x50 [ 316.671078] ? v9fs_vfs_rmdir+0x30/0x30 [ 316.675058] ? down_write_nested+0x8e/0x130 [ 316.679393] ? lock_two_nondirectories+0xdd/0x120 [ 316.684236] ? _down_write_nest_lock+0x130/0x130 [ 316.689017] ? kasan_check_write+0x14/0x20 [ 316.693252] ? do_raw_spin_lock+0xc1/0x200 [ 316.697499] vfs_rename+0x7fc/0x1a90 [ 316.701233] ? lookup_one_len+0x220/0x220 [ 316.705392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.710934] ? security_path_rename+0x210/0x300 [ 316.715604] do_renameat2+0xea5/0x1180 [ 316.719505] ? user_path_create+0x40/0x40 [ 316.723654] ? __lock_is_held+0xb5/0x140 [ 316.727729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.733283] ? check_preemption_disabled+0x48/0x200 [ 316.738318] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.743863] ? do_syscall_64+0x9a/0x820 [ 316.747851] ? do_syscall_64+0x9a/0x820 [ 316.751841] ? trace_hardirqs_on+0xbd/0x310 [ 316.756169] ? __ia32_sys_read+0xb0/0xb0 [ 316.760222] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.765574] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 316.771022] __x64_sys_rename+0x5e/0x80 [ 316.774988] do_syscall_64+0x1b9/0x820 [ 316.778876] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.784232] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.789151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.793979] ? trace_hardirqs_on_caller+0x310/0x310 [ 316.798976] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 316.803971] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.808970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.813804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.818974] RIP: 0033:0x457569 [ 316.822164] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.841047] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 316.848739] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 316.855999] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 316.863252] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 08:22:02 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x2000000}, 0x0) [ 316.870503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 316.877765] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:02 executing program 2 (fault-call:14 fault-nth:24): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xffffffd0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x200000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 317.053040] FAULT_INJECTION: forcing a failure. [ 317.053040] name failslab, interval 1, probability 0, space 0, times 0 [ 317.064463] CPU: 0 PID: 11208 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 317.071742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.081080] Call Trace: [ 317.083671] dump_stack+0x1c4/0x2b4 [ 317.087287] ? dump_stack_print_info.cold.2+0x52/0x52 [ 317.092468] should_fail.cold.4+0xa/0x17 [ 317.096518] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.101628] ? __lock_acquire+0x7ec/0x4ec0 [ 317.105842] ? find_held_lock+0x36/0x1c0 [ 317.109891] ? print_usage_bug+0xc0/0xc0 [ 317.113936] ? mark_held_locks+0x130/0x130 [ 317.118169] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 317.123944] ? graph_lock+0x170/0x170 [ 317.127743] ? __lock_acquire+0x7ec/0x4ec0 [ 317.131963] ? __lock_is_held+0xb5/0x140 [ 317.136005] ? __account_cfs_rq_runtime+0x790/0x790 [ 317.141013] __should_failslab+0x124/0x180 [ 317.145228] should_failslab+0x9/0x14 [ 317.149009] kmem_cache_alloc+0x47/0x730 [ 317.153054] ? print_usage_bug+0xc0/0xc0 [ 317.157105] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 317.162802] radix_tree_extend+0x294/0x660 [ 317.167024] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 317.172888] ? lock_downgrade+0x900/0x900 [ 317.177025] idr_get_free+0x83d/0xec0 [ 317.180834] ? ida_pre_get+0x130/0x130 [ 317.184711] ? lock_downgrade+0x900/0x900 [ 317.188860] ? mark_held_locks+0x130/0x130 [ 317.193078] ? graph_lock+0x170/0x170 [ 317.196858] ? lock_downgrade+0x900/0x900 [ 317.200990] ? print_usage_bug+0xc0/0xc0 [ 317.205042] idr_alloc_u32+0x201/0x3f0 [ 317.208914] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 317.213764] ? p9_idpool_get+0x23/0x90 [ 317.217638] idr_alloc+0x111/0x1b0 [ 317.221181] ? idr_alloc_u32+0x3f0/0x3f0 [ 317.225227] ? do_raw_spin_lock+0xc1/0x200 [ 317.229463] p9_idpool_get+0x3d/0x90 [ 317.233167] p9_client_prepare_req.part.8+0xec/0xc30 [ 317.238257] ? delete_node+0x30e/0xd20 [ 317.242129] ? unwind_get_return_address+0x61/0xa0 [ 317.247054] ? p9_free_req.isra.7+0x140/0x140 [ 317.251547] ? idr_destroy+0x1c0/0x1c0 [ 317.255420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.260939] ? replace_slot+0x151/0x520 [ 317.264910] p9_client_rpc+0x1c2/0x1480 [ 317.268862] ? radix_tree_descend+0x2e0/0x2e0 [ 317.273346] ? p9_client_prepare_req.part.8+0xc30/0xc30 [ 317.278688] ? find_held_lock+0x36/0x1c0 [ 317.282750] ? find_held_lock+0x36/0x1c0 [ 317.286795] ? mark_held_locks+0xc7/0x130 [ 317.290927] ? _raw_spin_unlock_irq+0x27/0x80 [ 317.295402] ? _raw_spin_unlock_irq+0x27/0x80 [ 317.299877] ? lockdep_hardirqs_on+0x421/0x5c0 [ 317.304441] ? trace_hardirqs_on+0xbd/0x310 [ 317.308761] ? kasan_check_read+0x11/0x20 [ 317.312888] ? p9_fid_create+0x1e2/0x2b0 [ 317.316929] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 317.322363] ? kasan_check_write+0x14/0x20 [ 317.326578] ? do_raw_spin_lock+0xc1/0x200 [ 317.330799] p9_client_walk+0x208/0xb30 [ 317.334755] ? smk_access_entry+0x310/0x310 [ 317.339068] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 317.344675] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 317.349691] ? graph_lock+0x170/0x170 [ 317.353479] ? graph_lock+0x170/0x170 [ 317.357264] ? v9fs_fid_add+0x240/0x240 [ 317.361218] ? __lock_is_held+0xb5/0x140 [ 317.365266] ? lock_acquire+0x1ed/0x520 [ 317.369222] ? lock_two_nondirectories+0xdd/0x120 [ 317.374055] v9fs_vfs_rename+0x239/0xd30 [ 317.378100] ? v9fs_vfs_rename+0x239/0xd30 [ 317.382318] ? lockref_get+0x42/0x50 [ 317.386021] ? v9fs_vfs_rmdir+0x30/0x30 [ 317.389978] ? down_write_nested+0x8e/0x130 [ 317.394282] ? lock_two_nondirectories+0xdd/0x120 [ 317.399104] ? _down_write_nest_lock+0x130/0x130 [ 317.403859] ? kasan_check_write+0x14/0x20 [ 317.408073] ? do_raw_spin_lock+0xc1/0x200 [ 317.412294] vfs_rename+0x7fc/0x1a90 [ 317.416008] ? lookup_one_len+0x220/0x220 [ 317.420142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.425662] ? security_path_rename+0x210/0x300 [ 317.430316] do_renameat2+0xea5/0x1180 [ 317.434196] ? user_path_create+0x40/0x40 [ 317.438329] ? __lock_is_held+0xb5/0x140 [ 317.442376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.447896] ? check_preemption_disabled+0x48/0x200 [ 317.452904] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 317.458433] ? do_syscall_64+0x9a/0x820 [ 317.462391] ? do_syscall_64+0x9a/0x820 [ 317.466353] ? trace_hardirqs_on+0xbd/0x310 [ 317.470661] ? __ia32_sys_read+0xb0/0xb0 [ 317.474718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.480177] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 317.485616] __x64_sys_rename+0x5e/0x80 [ 317.489577] do_syscall_64+0x1b9/0x820 [ 317.493449] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 317.498798] ? syscall_return_slowpath+0x5e0/0x5e0 [ 317.503720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.508549] ? trace_hardirqs_on_caller+0x310/0x310 [ 317.513738] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 317.518755] ? prepare_exit_to_usermode+0x291/0x3b0 [ 317.523775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.528619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.533794] RIP: 0033:0x457569 08:22:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x804) 08:22:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x74000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 317.536972] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.555855] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 317.563543] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 317.570793] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 317.578043] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 317.585294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 317.592546] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:03 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x5, 0x8040) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000002800)={{0xffffffffffffffff, 0x0, 0x28, 0x0, 0xfff0000}, 0x1000, 0xff, 'id0\x00', 'timer0\x00', 0x0, 0xfff, 0xacb, 0x1d, 0x9}) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0xffffffffffffff9a, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000002900)={[0x13000, 0xf000, 0x101000, 0xd004], 0xffffffff, 0x4, 0xad20}) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r1, &(0x7f0000000080)=@known='system.sockprotoname\x00') r2 = add_key(&(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000540)="cfb56b374d028e2ecc0eb9d687b1a68c2ec15163d7aa1a461602f5fe4742727e4869d35addb2b844834b6249580b8baff32768cc027ec8dea630c6c3f9e2209e08e1e1ae1abf4bd2199ac965a603780d5ea8066393e2408714bc34c35fec648fceff57798d6845fbc6094f75c446dfe23d69f45e181e8d161424f28b614065bce86cea05a133fc36d250e6f52c40b6dffc80b8c3c930a9165fbcbb03934a491bac70450192b07b136372ee3088cd053ebcd88c094b65f47fe3d702e6c34657729f6ff708686bda4525963c0fed0f84121e6c247282537dd3aaf6f24e4b311a3651987c31aeef2db2a4918fd3c809688b55409106e3ee44f1a0aafe413d67826818a87cbb903db17b3c342378f54cddcc2255247ba893b6e440e988c08d3611f6d21993ade5a9e7cf75b0675a1beb65cf670a84c06210bd1bf1d5ea60098c52a7bf1ae18eacbaef79896508ba5a7c93e826e97ac08924153810d5e2f513add91efaee44c61bcb78074b838e7d074b608caeca369b09c8211ef59f8a618c765ecd31d7b77126234622efd7f454e5c8b198688b483b60d400b4cd11bd1914b710554fc71a8e810fbb85807ac28de2e8970d0cc0cf82fe6cf7eebb1aa9cf065318ac91cb51d217a4a34cf6e322cc66b7dda52b4bd55c424a00b5ca68fd3d849ffa0ce102160573bd746aa43d04180d16a28378ec5e72e025afc2d9940ef9eb3806679d61894947fa099c544bd91acca462b9be70717a4e6c8e548743e5fa5d76ab79526c4b67781973739cc503b46508c3b73e7afc2bd734a9d5c2531752003ddf0ae1085a4101d99df08596aaaf924579227392bfce4f4423a42ffa6f4b8be59b629d9220c8c21752e246caac69a7ba3907df4c511c7036128e094081d6c07ac9a8f68224144ec20ca46a57e9e36c182552f49aa3b9efef01ec52b69bed370566b9794a3a63faaba7194e9676631d8dc46efe552bae71c197cf42b53e22794777650c643a5ceb4367bef80b906e16e536561586296af1a4bab771e86e840ccc73c5121550768f3f80d306b05e2a7e3a7ef68c99c6df351dd3d4266040976357314ef3beedf0235c391334c7c596c6f177c240296bd4af3b79ed7356319d6124160128b679d9e629b1b4ebc452d30ae188cae676dfcdbbf6ed1e6a8e134ee67f3f1550bbacab1a05e64e665127df5c68c9344b730e3e2f46ca3e9b84d8e71615ad91cbf04d500b00c060d95272649768b1bdb7c20dc85c79fc92cbce8a3aa0b8b00c2172fa36c55805873f719b9cc1264a31b37a4386250bddfd7a54b8f26fbebfe56dd6285074de698b515b70f56acaed8da2f40ac4870fe3b8ef308c8a10f7abbf5d431c477ae9c8e352d032466dd9d42530430044250c625c5e826c1de475b2672dccf7508d37c6aa8f653d534cbd64dc515a51b04b8ff34ee4c3ca73e18e90cdbea72847eff0a2544fe9ed2380fa643e0fc240eb5c1b4af52dde97cbe9df9d088d92fc8278528870d0962298543eca414cfd12bb24e6de7c1de801d67204ee69ccfd7b528b3060915b6ea721658803b701ae2d8dd1cac7c0e3744a121862d06696d4bc553839e21e89749fa58b78ce6c013c6a9bbc9a5448a3bf4dcfda43e2042a022986e2cfec9857ce83f0436470ef871e9ed16b6f2dc8db56c39bdaa1302c3a0ebb4460c2fc639424034b37e8e133772da4779497839885c1a6fbda062d8b1fc3bccddbdaf12a829b9a34444aff8b0baf5f8c7d8d77d223d4a7f3c03782cba755584f0631b0ccb44766d93509c7a701d086e7408f2419602b537459b376de268cbe4c5cf2a941e55a26e800a5fd8e23e956990887bfe4098d0b676bf76070a3491f2c2fc3da4201be4cadb02035b38eb7fced27330af9583e1a2e65c804dc579c74a2faa4b9e42c7b127f11f1fb7b0392ddb1705f0486f29c060b7896d6f675ee9e51e90bddfc88a80b11048f25119001a86b91b1265675bb1200caa27af7227b1650c46e4f400cf59357b1630dc97a09d0e57dcfee57276b1d69708279c0aa34c9b9d751bd941902362004a3d57b9f484ceb8b2a0197e76c0c1a61e57aac23c57db07855f75deaf8253d648cc3e44d2d8c1846d76dbdf90cd63becf55621fe05e525e58314b743be7169190a683645eadc7d5ae42e2b206d3ad697f4ef357e2a21fac6a91a7674d120bd3f474019d23150465c40aa987272e536e0ac655bd14030d182d16a12b53cd37841401d90b4a38d4438912038c56edb30226387628086078a25eedd9a5f969167eccaa55637a84dbf31edf29da8f7eef30ea2bfb9222bdacda212b3536fdfbf8605dcd4e6b9b6dafb6d34000bda1f73f5f0a198b3a38c8320be1a21f6ed9854673f94e4c6f534363a36a3ea6c280ecc065ca0ccdac7f65c5b16dd614ac5cf8c82f1733a7b6ed8c19a839e12a00964154e83d50a6b505b9e84246d498b0c871298932f517ce98d603a4acd9d9b1d38c800814791eee776b46ee83370c58b7dfd199f5de5dd3f9dd75195134bf00d075a4b0a4a36a245002f3c405647c34f23b972bf7927666222a2b5924a41a0371bcdfbc46cd260dc8fff2c204e6b2c330ca62a80df38700a31cdad5efaa38de65c3094afc40bc5e50cf29376e95dd57f2c47103aea0b8933076e471a49073ec5b20aeb1a62a8cce3f6f5a9b2da2fd8f8cedfef990c30e3a379c4e25461f7bde17b472a7d654d772fd9e30abf477701c926cd24152555276aa079ab53c8147a3407c7b93043713c6369d631dfef8817e73b8edef7581bcf6da5a8ccba1a6453e6ccda0419c86ab06a0d2aaba5609b9b49147619dea8e69a6df8c730364bc4bf461e87dc3b0d2773f7ffdd25a8990daa90b0907a638f110cf7b75c313ed78a9830a9e66d9c191e8f110956aea352a765f244285fefdfc6d5eb91ecbb6741ee2f305c3e1a5739254a2be0d21a0b8aa82c995d59318887501f8e68a746048d0b643909489320d7013676f057b23073b1e74c57c54a9f18fb50afc1894d77a4147e43ba02de05291f89b4540234f035bf7c0fe67049325b7c7afe343c51ea5d73a14ade05bf9bfe670223d34a46b3be74acfab4f4886b9bf5011bbc1e1b9bdf803c6fa457ef889d88d6ad712b9e9931627310c66fb383d59aa9e5b029081fd28d300ed62f9d80b7113efa47724adf6e6ed433a652e0e0edae2467440898dfa66c75bbbd0a66bb765b8a26f119864a5841b1579a85c6711fd31ca82d3913c9930536b85db6ec1a3069d9025313720ea0215067bc2bd7e1d6948c68d3a3da4db5f3b1ca0892ab34f94b16318a161028b1ccfab642f4d14aa8b50ed78c1a1de8a925c664615dda791975389642d79079745296e13723e7f005b541d44d41ecc57c63bfefa7a3cf94d5bb4051dffec9a4bf6864a2fc2cc1572d9082ac560a947f32d5f797dce134b604bb580afd605d9f558aa7aef008869fd36f7134f081a940574c5a092a49a34c7660db0e0e509405f9b50068b7b591da9426bbdd1bb945e8a06f28261bb289162ba17d9fda5adbe34eaa86feeec5c9a9b19ab5b8be2ac7acd62c4f4f7ad1d0452e65defd4a4ec7df56a8359c88e11f8c109dc52ba09c6c4f5ed276b91e53b50ae35c37857f5f180351aaed71473cae4535ffd77eaa20cd8d73f4081d42c044a04b87fe9a927e493be8513cc6402170541b93b80ff9bb4c5bed7013183d1f2fde711cad0db5b2c3b6f653b677f4dbc1698a256deff2731667040d8340c8a5bf010e94c74a2afce43f6de15603170692af5baba7d13d9a650b92ee99c0e01683fa7d77bc627e71151f275f6e54f00e6abc062449c1b14365ebaabac4b0f683285da00ae5628ba3b21cf13f99b2ce75e8bc47c7109d975bc8391a78f8ba6b95bbbbf91eda10df50a97aa71d7e0e9665e4e492a6a0b1db2b453856f0f46404ae60c811b4be880305de862083260443023c6b3b2f819a1b66eaa75f9318daf3786abc14e64b37563f359eb2d2e33d28d1d68ba48c41e7af887eea9181b9c3a1e4bc665774fa1ff1f5ff3cfb4727ae6f22a1324e6fee43a22a5eefa75d0cfad0a7dce7afa6baa9287f05a49d9ec8ad9e04904fb28dc5db47c97b56bc2c0c142de1f5f1d36428c1036582b68955743f6ca08696959bfd9aed054999331eab5e95c33a8bfb71dd31e74ec317d78ca4dbb5b1602cb08c4f487d9c59be45eec3d0b2cb8784323fba8b9942bdda3e419bfbd4de742e13e2de33a378682e7fb12e41559e09be778818ef9b61ff87a17f1af4e62cede84b7bca311a74d0dc509fb55aefcb1be9a0eab09e1239ca9ac2fd9ee56c8a4d343783e8af0aac4635d27b8c514ee74fb2cb163d8febaf6ce45c5ffccf908552fee3d0c467f09b27d60ddaf8feefb2e7022d222c1b428a6bcc951780a7886a8e6e000c2cb949b8a1d6684b97a2804067cf982d6d39926a0ab597ddfa94dbef34ed8475d15a4595cf64771457e701540f73ace913453a60cccd01a99e5350dc262bf1aae2d3e1d1f2f5ab9172b700b140d21d94369019374031ea70e4ec7f0617561eb381d7ec34aab188eaa5e2fae590d1495d9a05fb40534f12fb65b8ab733412aa9f2eadffafa9c1e7c18163a093df83c2da2c092f87b7d50fd6b44647e74e65691e59568a016c92753a40fa0a69276b6007de49a23094f83bbef3a6685a88220deaac62e17724745486ae946995e8ee3e1de57352bcc937746c2d5bc636a49779dbb3d5eab3e9875c551a67644b404c1cbee0a4b79a16cff38be88f64d49779a9cdd3084788c3c2bc897b8455e9329f22bf952fbe283ec25a8e50dba5bcaca2ff19c7889f7d126a48afb7ed0d46ac48d4cfad289a7b3381365b5180b8d8dfb400edd1c3cdb84b5d4fbb6d3f370d427e9febc9d3c8e10dee3dd240e2d9a2e38f420cd7d9ba7726e88ff76ab4935cedc7fcd95da957f2d9474f509843e78b34425f0e38e1ce77970f7c1e0f929aa0650776d2613212816632175c01ed04272a751fc0741a0e7821ebf3bb344a09827349d6475041a54e18441f1a16f5ac6b96d7f7af505be5fbefd9e6ff8ea571f0deba61c87646a49f5162b6f0828373dec3fbd01d5088ebbbeb48e9a3ad83facff41b1f92cb4f36ea3b8a067749009452338bc8e7effb198877666ea8e6d85a7fbe3764596be541112285c05a6fe80ea31d6a230a6f9fdc055d113de7df9ec2f56f78b93ca8b3380b626eca457e47725f448f1998369dc3c251405b2e5a4132a0db0cd62c09134d3984e075cf62f5a9c57b438acca5138c6ab8753ad475c02241727cbcaf456a43c52cbec5898c46a3c849723dcd34a33e2656515ca7379a98f6ffe02b735372429a4499b91a71606fc1cc56b259a64203057611c48913029e44f9470955508d514faa0c5bd8a8b45121d891fc571e3d754fffa12fc4fc11da3c3ce03591b54c9c384b01d54bb83a19a503895a907575f54e61392337542216526186d5fd268010a390fb1f9de9f56b48345e3a79e95650a37cb1c54671546abbbd9493a631912bad80b325624e4f32e3a2cc2211bc4d5d6586770c6fefd87ef6925c87087ec25ca53cd27d6b43a5d4678ce8546d1293672192bec3e4ade393b3ac614df93dee38d99245cc43bebe16c91a84daaa34509b10fc416af053b8dfdc659e031ffb643bca2c13048bb01a7ccfe471958438e5e75530756d7c77998c4f101e41eaf5ce1e72a78dacae28f07377abffcefc36212a8df89454265aa96db23f6c427b2d6e2410f4b3e4046beca482d33b54e12f0b0578373a03c58c3c103fe8d46b5a01", 0x1000, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000001540)=""/4096, 0x1000) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000002980)=""/167) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000300)="ad795cbbc288f65c8178952425584940c781464a1735f8318e84b653e8f377de910ba68aba8ea569e79bcbdb3b1ebf0193b543e401178d1b8666b2b308c040119d0394985761ecaec73c678ef262b641f26379d8916a7d47ee26752bee3d75c982ac7b20bc497ea2ac99350de54136c73e74493df45676af4001edb31c19", 0x7e}, {&(0x7f0000000140)="7f", 0x1}, {&(0x7f0000000380)="7661be96bc9cd9d8625cfc4688a873bfd76999dc69fae429730feb479dae3e3770f149c4fabaecc4eaf9d1df29b77888b99170b302bc06ef5a914e83822cd710845aaf6d6d63b71c036fe9f6c938e78fb9d8dd862e8859c48e2e17fe90ea9a4c73d03136fcc48f0c30045ab125a29ffe409c86a0f3f62962a0da9cf0a91042e1b51e08cd02e292454d14a7d55fd302fe", 0x90}, {&(0x7f0000002540)="6e4501a826c39c4388d1d697d86984a33dea5c5f07391450708e63c5c730dda40a1660c8ed165afce1c846f8309e4fd81d5cb16bee2165439af8940a0e4daf4de8eb74bbb109b518c8c7609f58a10e0e420dc45f205985aa27bd2564760decfb5371dfa7614ffdf35bd21a7ace", 0x6d}, {&(0x7f00000025c0)="6265633c034ffce0a023909a93eddbe835a22c8bb15659ee58cd9127351b7da66b5ad43d89feda9cd49b0bc0d29e92840888df68cf589da5332d23f467c09323b57f467ac40524acd25d2c6127ac9556f0d75eb76ffbe0d587f9e9344bca8405f08bb93874415d12889414227f33c800a6a4793b28987f1579f310986d1cb244134ca11e1ad517859bbea547640c42179c21283c3cb300531317db007123d6822153496d95cb46707fddb306a2dde1bbdd40afe89b1878fd24dbe8643bf78075f4fcde69ac8a25d999d037b97cf3d198a03d418fbec9a013bdf7b4569205a930c67d109914fb4a7d990f1177d451d29c92f960ac5298", 0xf6}, {&(0x7f00000026c0)="ce47e0f21b77d4971f4d1bc5205090a89fb61c915c3b8a5d15196cfc43619ae435bce8fb7f9ca3249d311eee67984b51d2a62392b2636bcce185c27affc75c484fbbc70a51413e1d3e95c4aa061fdc197c6a174add6fd324a333639303da262bb0a3bcd7896a2b138cb1371acbf8265e306ca80cb463606eea6fe3ab832ca5b037d34c93717d8dfb61903e2622695f3e306b9852fe8c6547cf529179ab239b08c796b6cbbebbb08500d84540ab9cf61d4cfe6ab94a00", 0xb6}], 0x6, &(0x7f0000000440)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xa, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:03 executing program 2 (fault-call:14 fault-nth:25): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101200) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xa0ffffff, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:03 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x3000000}, 0x0) [ 317.794625] FAULT_INJECTION: forcing a failure. [ 317.794625] name failslab, interval 1, probability 0, space 0, times 0 [ 317.818252] CPU: 1 PID: 11221 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 317.825549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.834915] Call Trace: [ 317.837517] dump_stack+0x1c4/0x2b4 [ 317.841157] ? dump_stack_print_info.cold.2+0x52/0x52 [ 317.846361] ? delete_node+0x30e/0xd20 [ 317.850274] should_fail.cold.4+0xa/0x17 [ 317.854363] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.859487] ? replace_slot+0x151/0x520 [ 317.863472] ? graph_lock+0x170/0x170 [ 317.867282] ? graph_lock+0x170/0x170 [ 317.871089] ? graph_lock+0x170/0x170 [ 317.874897] ? print_usage_bug+0xc0/0xc0 [ 317.878968] ? find_held_lock+0x36/0x1c0 [ 317.883031] ? __lock_is_held+0xb5/0x140 [ 317.887106] ? ___might_sleep+0x1ed/0x300 [ 317.891260] ? arch_local_save_flags+0x40/0x40 [ 317.895860] __should_failslab+0x124/0x180 [ 317.900096] should_failslab+0x9/0x14 [ 317.903902] kmem_cache_alloc_trace+0x2d7/0x750 [ 317.908580] ? _raw_spin_unlock+0x2c/0x50 [ 317.912737] p9_fid_create+0x49/0x2b0 [ 317.916541] p9_client_walk+0x124/0xb30 [ 317.920529] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 317.926159] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 317.931183] ? graph_lock+0x170/0x170 [ 317.934982] ? graph_lock+0x170/0x170 [ 317.938819] ? v9fs_fid_add+0x240/0x240 [ 317.942797] ? __lock_is_held+0xb5/0x140 [ 317.946864] ? lock_acquire+0x1ed/0x520 [ 317.950848] ? lock_two_nondirectories+0xdd/0x120 [ 317.955708] v9fs_vfs_rename+0x2ef/0xd30 [ 317.959771] ? v9fs_vfs_rename+0x2ef/0xd30 [ 317.964004] ? lockref_get+0x42/0x50 [ 317.967728] ? v9fs_vfs_rmdir+0x30/0x30 [ 317.971706] ? down_write_nested+0x8e/0x130 [ 317.976029] ? lock_two_nondirectories+0xdd/0x120 [ 317.980883] ? _down_write_nest_lock+0x130/0x130 [ 317.985648] ? kasan_check_write+0x14/0x20 [ 317.989898] ? do_raw_spin_lock+0xc1/0x200 [ 317.994147] vfs_rename+0x7fc/0x1a90 [ 317.997882] ? lookup_one_len+0x220/0x220 [ 318.002041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.007589] ? security_path_rename+0x210/0x300 [ 318.012265] do_renameat2+0xea5/0x1180 [ 318.016182] ? user_path_create+0x40/0x40 [ 318.020332] ? __lock_is_held+0xb5/0x140 [ 318.024402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.029944] ? check_preemption_disabled+0x48/0x200 [ 318.034978] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 318.040526] ? do_syscall_64+0x9a/0x820 [ 318.044508] ? do_syscall_64+0x9a/0x820 [ 318.048505] ? trace_hardirqs_on+0xbd/0x310 [ 318.052835] ? __ia32_sys_read+0xb0/0xb0 [ 318.056904] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.062271] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 318.067728] __x64_sys_rename+0x5e/0x80 [ 318.071705] do_syscall_64+0x1b9/0x820 [ 318.075617] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 318.080996] ? syscall_return_slowpath+0x5e0/0x5e0 [ 318.085932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.090783] ? trace_hardirqs_on_caller+0x310/0x310 08:22:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xff00, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 318.095802] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 318.100831] ? prepare_exit_to_usermode+0x291/0x3b0 [ 318.105851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.110703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.110730] RIP: 0033:0x457569 [ 318.119083] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:22:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() init_module(&(0x7f0000000080)='loem1/nodevmime_type$:system\\\x00', 0x1e, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x10081) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) 08:22:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x1c545f, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 318.119092] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 318.119109] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 318.119118] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 318.119127] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 318.119137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 318.119162] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x400000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:04 executing program 2 (fault-call:14 fault-nth:26): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:04 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000300)=0xc) process_vm_readv(r0, &(0x7f0000000840)=[{&(0x7f0000000340)=""/189, 0xbd}, {&(0x7f0000000400)=""/118, 0x76}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/80, 0x50}, {&(0x7f00000006c0)=""/243, 0xf3}, {&(0x7f00000007c0)=""/100, 0x64}], 0x6, &(0x7f0000001c00)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/69, 0x45}, {&(0x7f0000001940)=""/201, 0xc9}, {&(0x7f0000001a40)=""/197, 0xc5}, {&(0x7f0000001b40)=""/182, 0xb6}], 0x5, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x801) ioctl$TIOCEXCL(r3, 0x540c) truncate(&(0x7f0000000140)='./file0\x00', 0x1fffffffe00) ioctl$FICLONE(r2, 0x40049409, r1) splice(r1, &(0x7f0000000040), r3, &(0x7f0000000080), 0x4, 0x2) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f00000000c0)=0x1, 0x4) 08:22:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x7a000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:04 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x90ffffff00000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 318.449744] FAULT_INJECTION: forcing a failure. [ 318.449744] name failslab, interval 1, probability 0, space 0, times 0 [ 318.460988] CPU: 1 PID: 11258 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 318.468269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.477623] Call Trace: [ 318.480218] dump_stack+0x1c4/0x2b4 [ 318.483860] ? dump_stack_print_info.cold.2+0x52/0x52 [ 318.489071] ? find_held_lock+0x36/0x1c0 [ 318.493145] should_fail.cold.4+0xa/0x17 [ 318.497200] ? __debug_object_init+0x57d/0x1290 [ 318.501873] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.506984] ? graph_lock+0x170/0x170 [ 318.510783] ? trace_hardirqs_off+0xb8/0x310 [ 318.515191] ? kasan_check_read+0x11/0x20 [ 318.519333] ? do_raw_spin_unlock+0xa7/0x2f0 [ 318.523745] ? trace_hardirqs_on+0x310/0x310 [ 318.528153] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 318.532758] ? kasan_check_write+0x14/0x20 [ 318.536999] ? find_held_lock+0x36/0x1c0 [ 318.541060] ? graph_lock+0x170/0x170 [ 318.544865] ? debug_object_activate+0x402/0x600 [ 318.549622] ? lock_downgrade+0x900/0x900 [ 318.553772] ? find_held_lock+0x36/0x1c0 [ 318.557838] ? debug_object_active_state+0x2f5/0x4d0 [ 318.562943] __should_failslab+0x124/0x180 [ 318.567184] should_failslab+0x9/0x14 [ 318.570980] kmem_cache_alloc+0x47/0x730 [ 318.575040] ? do_raw_spin_unlock+0xa7/0x2f0 [ 318.579444] ? trace_hardirqs_on+0x310/0x310 [ 318.583841] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 318.589535] radix_tree_extend+0x294/0x660 [ 318.593753] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 318.599624] ? __lock_acquire+0x7ec/0x4ec0 [ 318.603860] idr_get_free+0x83d/0xec0 [ 318.607647] ? __switch_to_asm+0x34/0x70 [ 318.611689] ? __switch_to_asm+0x40/0x70 [ 318.615734] ? ida_pre_get+0x130/0x130 [ 318.619609] ? print_usage_bug+0xc0/0xc0 [ 318.623649] ? mark_held_locks+0x130/0x130 [ 318.627871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.633388] ? delete_node+0x30e/0xd20 [ 318.637261] ? __lock_acquire+0x7ec/0x4ec0 [ 318.641477] ? graph_lock+0x170/0x170 [ 318.645255] ? print_usage_bug+0xc0/0xc0 [ 318.649315] ? replace_slot+0x151/0x520 [ 318.653273] ? mark_held_locks+0xc7/0x130 [ 318.657426] idr_alloc_u32+0x201/0x3f0 [ 318.661298] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 318.666129] ? p9_idpool_get+0x23/0x90 [ 318.670004] idr_alloc+0x111/0x1b0 [ 318.673547] ? idr_alloc_u32+0x3f0/0x3f0 [ 318.677590] ? do_raw_spin_lock+0xc1/0x200 [ 318.681828] p9_idpool_get+0x3d/0x90 [ 318.685527] p9_client_prepare_req.part.8+0xec/0xc30 [ 318.690623] ? is_bpf_text_address+0xd3/0x170 [ 318.695107] ? kernel_text_address+0x79/0xf0 [ 318.699495] ? __kernel_text_address+0xd/0x40 [ 318.703975] ? p9_free_req.isra.7+0x140/0x140 [ 318.708453] ? __save_stack_trace+0x8d/0xf0 [ 318.712767] p9_client_rpc+0x1c2/0x1480 [ 318.716727] ? do_renameat2+0xea5/0x1180 [ 318.720772] ? p9_client_prepare_req.part.8+0xc30/0xc30 [ 318.726137] ? trace_hardirqs_off+0xb8/0x310 [ 318.730525] ? kasan_check_read+0x11/0x20 [ 318.734652] ? do_raw_spin_unlock+0xa7/0x2f0 [ 318.739043] ? trace_hardirqs_on+0x310/0x310 [ 318.743433] ? kasan_check_write+0x14/0x20 [ 318.747650] ? mark_held_locks+0xc7/0x130 [ 318.751778] ? kfree+0x107/0x230 [ 318.755122] ? kfree+0x107/0x230 [ 318.758467] ? lockdep_hardirqs_on+0x421/0x5c0 [ 318.763037] ? trace_hardirqs_on+0xbd/0x310 [ 318.767341] ? p9_fid_destroy+0x9f/0xd0 [ 318.771302] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 318.776740] ? p9_fid_destroy+0x9f/0xd0 [ 318.780699] p9_client_clunk+0x93/0x180 [ 318.784664] v9fs_vfs_rename+0x2d0/0xd30 [ 318.788705] ? lockref_get+0x42/0x50 [ 318.792404] ? v9fs_vfs_rmdir+0x30/0x30 [ 318.796370] vfs_rename+0x7fc/0x1a90 [ 318.800073] ? lookup_one_len+0x220/0x220 [ 318.804213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.809729] ? security_path_rename+0x210/0x300 [ 318.814378] do_renameat2+0xea5/0x1180 [ 318.818273] ? user_path_create+0x40/0x40 [ 318.822403] ? __lock_is_held+0xb5/0x140 [ 318.826453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.831977] ? check_preemption_disabled+0x48/0x200 [ 318.836984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 318.842503] ? do_syscall_64+0x9a/0x820 [ 318.846458] ? do_syscall_64+0x9a/0x820 [ 318.850420] ? trace_hardirqs_on+0xbd/0x310 [ 318.854725] ? __ia32_sys_read+0xb0/0xb0 [ 318.858767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.864125] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 318.869559] __x64_sys_rename+0x5e/0x80 [ 318.873522] do_syscall_64+0x1b9/0x820 [ 318.877393] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 318.882739] ? syscall_return_slowpath+0x5e0/0x5e0 [ 318.887666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.892490] ? trace_hardirqs_on_caller+0x310/0x310 [ 318.897490] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 318.902492] ? prepare_exit_to_usermode+0x291/0x3b0 [ 318.907492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.912320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.917507] RIP: 0033:0x457569 [ 318.920686] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.939571] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 08:22:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x204000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x99701c2a2ab729d4, &(0x7f0000000100), 0x1000000000000121, &(0x7f0000001580), 0xfffffe1c, 0x4}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:04 executing program 1: init_module(&(0x7f0000000040)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x267, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8400, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0xffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x1000000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:05 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x100000}, 0x0) [ 318.947284] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 318.954536] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 318.961790] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 318.969039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 318.976291] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x300000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:05 executing program 2 (fault-call:14 fault-nth:27): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:05 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffcf4, &(0x7f0000000040), 0x0, &(0x7f0000001580)}, 0x80) getsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000540)=""/4096, &(0x7f0000000040)=0x1000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:05 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r1 = socket$inet(0x2, 0x7, 0x1dd1) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14, 0x80000) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000480)={@remote, @dev={0xac, 0x14, 0x14, 0x14}, r2}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f00000006c0)='/dev/snd/pcmC#D#p\x00', 0xb862, 0x2080) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x0, 0x1}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x4e24, @rand_addr=0xb13}}, 0x3, 0x1000}, &(0x7f0000000100)=0x90) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x80ffff, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 319.186043] FAULT_INJECTION: forcing a failure. [ 319.186043] name failslab, interval 1, probability 0, space 0, times 0 [ 319.224453] CPU: 1 PID: 11289 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 319.231749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.241102] Call Trace: [ 319.243700] dump_stack+0x1c4/0x2b4 [ 319.247341] ? dump_stack_print_info.cold.2+0x52/0x52 [ 319.252535] ? delete_node+0x30e/0xd20 [ 319.256448] should_fail.cold.4+0xa/0x17 [ 319.260520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 319.265636] ? replace_slot+0x151/0x520 [ 319.269643] ? graph_lock+0x170/0x170 [ 319.273448] ? graph_lock+0x170/0x170 [ 319.277263] ? graph_lock+0x170/0x170 [ 319.281071] ? print_usage_bug+0xc0/0xc0 [ 319.285136] ? find_held_lock+0x36/0x1c0 [ 319.289202] ? __lock_is_held+0xb5/0x140 [ 319.293279] ? ___might_sleep+0x1ed/0x300 [ 319.297428] ? arch_local_save_flags+0x40/0x40 [ 319.302022] __should_failslab+0x124/0x180 [ 319.306266] should_failslab+0x9/0x14 [ 319.310074] kmem_cache_alloc_trace+0x2d7/0x750 [ 319.314754] ? _raw_spin_unlock+0x2c/0x50 [ 319.318910] p9_fid_create+0x49/0x2b0 [ 319.322712] p9_client_walk+0x124/0xb30 [ 319.326698] ? p9_client_zc_rpc.constprop.10+0x1550/0x1550 [ 319.332330] ? v9fs_fid_lookup_with_uid+0x11d/0xb90 [ 319.337347] ? graph_lock+0x170/0x170 [ 319.341152] ? graph_lock+0x170/0x170 [ 319.344955] ? v9fs_fid_add+0x240/0x240 [ 319.348915] ? __lock_is_held+0xb5/0x140 [ 319.352960] ? lock_acquire+0x1ed/0x520 [ 319.356917] ? lock_two_nondirectories+0xdd/0x120 [ 319.361749] v9fs_vfs_rename+0x2ef/0xd30 [ 319.365789] ? v9fs_vfs_rename+0x2ef/0xd30 [ 319.370008] ? lockref_get+0x42/0x50 [ 319.373708] ? v9fs_vfs_rmdir+0x30/0x30 [ 319.377665] ? down_write_nested+0x8e/0x130 [ 319.381968] ? lock_two_nondirectories+0xdd/0x120 [ 319.386790] ? _down_write_nest_lock+0x130/0x130 [ 319.391527] ? kasan_check_write+0x14/0x20 [ 319.395761] ? do_raw_spin_lock+0xc1/0x200 [ 319.399982] vfs_rename+0x7fc/0x1a90 [ 319.403683] ? lookup_one_len+0x220/0x220 [ 319.407814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.413333] ? security_path_rename+0x210/0x300 [ 319.417989] do_renameat2+0xea5/0x1180 [ 319.421889] ? user_path_create+0x40/0x40 [ 319.426019] ? __lock_is_held+0xb5/0x140 [ 319.430072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.435599] ? check_preemption_disabled+0x48/0x200 [ 319.440610] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 319.446134] ? do_syscall_64+0x9a/0x820 [ 319.450095] ? do_syscall_64+0x9a/0x820 [ 319.454064] ? trace_hardirqs_on+0xbd/0x310 [ 319.458370] ? __ia32_sys_read+0xb0/0xb0 [ 319.462419] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.467767] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 319.473211] __x64_sys_rename+0x5e/0x80 [ 319.477187] do_syscall_64+0x1b9/0x820 [ 319.481065] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 319.486416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 319.491331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.496160] ? trace_hardirqs_on_caller+0x310/0x310 [ 319.501166] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 319.506170] ? prepare_exit_to_usermode+0x291/0x3b0 [ 319.511178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.516534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.521708] RIP: 0033:0x457569 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x22000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:05 executing program 1: lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.syz\x00') init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') sendto$unix(r0, &(0x7f0000000300)="612068b1cf6f174c70031abef8f31c89cbb3e690bd6360c09c83eb39bd158a6bdebc36df613699990900b8d6d344d18bb94ab5d750523e19ce307fe4e922282702efbcd5dacd7220f2f093f48987d5fd7423a683b2ae9fa40a6a1beb6e7c6015a916aed62b155966ae7b1141a4e9d4ecfbebf142f7525c28d68f1d1c457089180f0b9f43a7c442f74122fb26fbbb79517161770eceb5dc9c384acc35979292b24a0b6acacbbf406758823f000fbd", 0xae, 0x4, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000001580), 0x2) [ 319.524886] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.543770] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 319.551463] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 319.558713] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 319.565969] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 319.573225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 319.580477] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) ioctl$LOOP_CLR_FD(r0, 0x4c01) 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x4, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xffffff90, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:05 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x10}, 0x0) 08:22:05 executing program 2 (fault-call:14 fault-nth:28): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x7a00000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x7a00, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 319.958601] FAULT_INJECTION: forcing a failure. [ 319.958601] name failslab, interval 1, probability 0, space 0, times 0 [ 319.969861] CPU: 0 PID: 11325 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 319.977115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.986451] Call Trace: [ 319.989043] dump_stack+0x1c4/0x2b4 [ 319.992655] ? dump_stack_print_info.cold.2+0x52/0x52 [ 319.997838] should_fail.cold.4+0xa/0x17 [ 320.001888] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 320.007669] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 320.012774] ? print_usage_bug+0xc0/0xc0 [ 320.016847] ? __lock_acquire+0x7ec/0x4ec0 [ 320.021066] ? __lock_is_held+0xb5/0x140 [ 320.025108] ? __account_cfs_rq_runtime+0x790/0x790 [ 320.030115] ? check_noncircular+0x20/0x20 [ 320.034332] ? graph_lock+0x170/0x170 [ 320.038110] ? graph_lock+0x170/0x170 [ 320.041893] ? update_load_avg+0x2470/0x2470 [ 320.046286] ? check_noncircular+0x20/0x20 [ 320.050510] ? check_noncircular+0x20/0x20 [ 320.054738] ? mark_held_locks+0x130/0x130 [ 320.058955] ? find_held_lock+0x36/0x1c0 [ 320.063017] __should_failslab+0x124/0x180 [ 320.067235] should_failslab+0x9/0x14 [ 320.071015] kmem_cache_alloc+0x47/0x730 [ 320.075059] ? graph_lock+0x170/0x170 [ 320.078840] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 320.084537] radix_tree_extend+0x294/0x660 [ 320.088769] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 320.094638] ? debug_object_activate+0x402/0x600 [ 320.099382] idr_get_free+0x83d/0xec0 [ 320.103169] ? ida_pre_get+0x130/0x130 [ 320.107055] ? mark_held_locks+0x130/0x130 [ 320.111275] ? trace_hardirqs_on+0x310/0x310 [ 320.115679] ? mark_held_locks+0x130/0x130 [ 320.119898] ? trace_hardirqs_off+0xb8/0x310 [ 320.124285] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 320.129545] ? trace_hardirqs_on+0x310/0x310 [ 320.134023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.139545] idr_alloc_u32+0x201/0x3f0 [ 320.143416] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 320.148241] ? p9_idpool_get+0x23/0x90 [ 320.152111] ? __lock_acquire+0x7ec/0x4ec0 [ 320.156327] idr_alloc+0x111/0x1b0 [ 320.159962] ? idr_alloc_u32+0x3f0/0x3f0 [ 320.164007] ? do_raw_spin_lock+0xc1/0x200 [ 320.168227] p9_idpool_get+0x3d/0x90 [ 320.171921] p9_client_prepare_req.part.8+0xec/0xc30 [ 320.177011] ? p9_free_req.isra.7+0x140/0x140 [ 320.181497] ? kasan_check_read+0x11/0x20 [ 320.185626] ? do_raw_spin_unlock+0xa7/0x2f0 [ 320.190013] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 320.194576] ? __d_lookup_done+0x610/0x610 [ 320.198794] p9_client_rpc+0x1c2/0x1480 [ 320.202755] ? p9_client_prepare_req.part.8+0xc30/0xc30 [ 320.208100] ? graph_lock+0x170/0x170 [ 320.211878] ? graph_lock+0x170/0x170 [ 320.215753] ? find_held_lock+0x36/0x1c0 [ 320.219802] ? v9fs_vfs_rename+0x3eb/0xd30 [ 320.224017] ? lock_downgrade+0x900/0x900 [ 320.228148] ? d_move+0x78/0x90 [ 320.231407] ? lock_downgrade+0x900/0x900 [ 320.235537] ? lock_downgrade+0x900/0x900 [ 320.239673] ? up_write+0x7b/0x220 [ 320.243196] p9_client_clunk+0x93/0x180 [ 320.247152] v9fs_vfs_rename+0x3f7/0xd30 [ 320.251196] ? lockref_get+0x42/0x50 [ 320.254896] ? v9fs_vfs_rmdir+0x30/0x30 [ 320.258856] ? snd_us16x08_controls_create+0x42f/0x1320 [ 320.264216] vfs_rename+0x7fc/0x1a90 [ 320.267921] ? lookup_one_len+0x220/0x220 [ 320.272055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.277578] ? security_path_rename+0x210/0x300 [ 320.282235] do_renameat2+0xea5/0x1180 [ 320.286117] ? user_path_create+0x40/0x40 [ 320.290246] ? __lock_is_held+0xb5/0x140 [ 320.294291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.299811] ? check_preemption_disabled+0x48/0x200 [ 320.304820] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 320.310341] ? do_syscall_64+0x9a/0x820 [ 320.314295] ? do_syscall_64+0x9a/0x820 [ 320.318255] ? trace_hardirqs_on+0xbd/0x310 [ 320.322556] ? __ia32_sys_read+0xb0/0xb0 [ 320.326595] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.331938] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 320.337374] __x64_sys_rename+0x5e/0x80 [ 320.341344] do_syscall_64+0x1b9/0x820 [ 320.345736] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 320.351085] ? syscall_return_slowpath+0x5e0/0x5e0 [ 320.355996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.360825] ? trace_hardirqs_on_caller+0x310/0x310 [ 320.365828] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 320.370825] ? prepare_exit_to_usermode+0x291/0x3b0 [ 320.375825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.380652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.385821] RIP: 0033:0x457569 [ 320.388998] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.407876] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 320.415566] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 320.422812] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 320.430059] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 320.437310] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 320.444559] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:06 executing program 2 (fault-call:14 fault-nth:29): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x600000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 320.572657] FAULT_INJECTION: forcing a failure. [ 320.572657] name failslab, interval 1, probability 0, space 0, times 0 [ 320.583879] CPU: 1 PID: 11340 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 320.591147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.600496] Call Trace: [ 320.603093] dump_stack+0x1c4/0x2b4 [ 320.606747] ? dump_stack_print_info.cold.2+0x52/0x52 [ 320.611963] should_fail.cold.4+0xa/0x17 [ 320.616028] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 320.621833] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 320.626964] ? print_usage_bug+0xc0/0xc0 [ 320.631033] ? __lock_acquire+0x7ec/0x4ec0 [ 320.635269] ? __lock_is_held+0xb5/0x140 [ 320.639328] ? __account_cfs_rq_runtime+0x790/0x790 [ 320.644360] ? check_noncircular+0x20/0x20 [ 320.648587] ? graph_lock+0x170/0x170 [ 320.652370] ? graph_lock+0x170/0x170 [ 320.656155] ? update_load_avg+0x2470/0x2470 [ 320.660552] ? check_noncircular+0x20/0x20 [ 320.664769] ? check_noncircular+0x20/0x20 [ 320.668985] ? mark_held_locks+0x130/0x130 [ 320.673204] ? find_held_lock+0x36/0x1c0 [ 320.677250] __should_failslab+0x124/0x180 [ 320.681471] should_failslab+0x9/0x14 [ 320.685253] kmem_cache_alloc+0x47/0x730 [ 320.689300] ? graph_lock+0x170/0x170 [ 320.693091] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 320.698783] radix_tree_extend+0x294/0x660 [ 320.703001] ? radix_tree_node_alloc.constprop.18+0x370/0x370 [ 320.708867] ? debug_object_activate+0x402/0x600 [ 320.713610] idr_get_free+0x83d/0xec0 [ 320.717403] ? ida_pre_get+0x130/0x130 [ 320.721285] ? mark_held_locks+0x130/0x130 [ 320.725515] ? trace_hardirqs_on+0x310/0x310 [ 320.729914] ? mark_held_locks+0x130/0x130 [ 320.734135] ? trace_hardirqs_off+0xb8/0x310 [ 320.738535] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 320.743795] ? trace_hardirqs_on+0x310/0x310 [ 320.748190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.753708] idr_alloc_u32+0x201/0x3f0 [ 320.757589] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 320.762418] ? p9_idpool_get+0x23/0x90 [ 320.766297] ? __lock_acquire+0x7ec/0x4ec0 [ 320.770528] idr_alloc+0x111/0x1b0 [ 320.774051] ? idr_alloc_u32+0x3f0/0x3f0 [ 320.778098] ? do_raw_spin_lock+0xc1/0x200 [ 320.782337] p9_idpool_get+0x3d/0x90 [ 320.786048] p9_client_prepare_req.part.8+0xec/0xc30 [ 320.791137] ? p9_free_req.isra.7+0x140/0x140 [ 320.795617] ? kasan_check_read+0x11/0x20 [ 320.799749] ? do_raw_spin_unlock+0xa7/0x2f0 [ 320.804146] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 320.808716] ? __d_lookup_done+0x610/0x610 [ 320.812946] p9_client_rpc+0x1c2/0x1480 [ 320.816913] ? p9_client_prepare_req.part.8+0xc30/0xc30 [ 320.822266] ? graph_lock+0x170/0x170 [ 320.826080] ? graph_lock+0x170/0x170 [ 320.829870] ? find_held_lock+0x36/0x1c0 [ 320.833926] ? v9fs_vfs_rename+0x3eb/0xd30 [ 320.838141] ? lock_downgrade+0x900/0x900 [ 320.842277] ? d_move+0x78/0x90 [ 320.845538] ? lock_downgrade+0x900/0x900 [ 320.849666] ? lock_downgrade+0x900/0x900 [ 320.853802] ? up_write+0x7b/0x220 [ 320.857329] p9_client_clunk+0x93/0x180 [ 320.861287] v9fs_vfs_rename+0x3f7/0xd30 [ 320.865335] ? lockref_get+0x42/0x50 [ 320.869039] ? v9fs_vfs_rmdir+0x30/0x30 [ 320.872998] ? seq_pad+0x18f/0x250 [ 320.876536] vfs_rename+0x7fc/0x1a90 [ 320.880239] ? lookup_one_len+0x220/0x220 [ 320.884374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.889924] ? security_path_rename+0x210/0x300 [ 320.894582] do_renameat2+0xea5/0x1180 [ 320.898475] ? user_path_create+0x40/0x40 [ 320.902603] ? __lock_is_held+0xb5/0x140 [ 320.906648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.912168] ? check_preemption_disabled+0x48/0x200 [ 320.917174] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 320.922697] ? do_syscall_64+0x9a/0x820 [ 320.926653] ? do_syscall_64+0x9a/0x820 [ 320.930611] ? trace_hardirqs_on+0xbd/0x310 [ 320.934922] ? __ia32_sys_read+0xb0/0xb0 [ 320.938968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.944320] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 320.949755] __x64_sys_rename+0x5e/0x80 [ 320.953712] do_syscall_64+0x1b9/0x820 [ 320.957579] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 320.962931] ? syscall_return_slowpath+0x5e0/0x5e0 [ 320.967839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.972662] ? trace_hardirqs_on_caller+0x310/0x310 [ 320.977658] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 320.982653] ? prepare_exit_to_usermode+0x291/0x3b0 [ 320.987657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.992489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.997671] RIP: 0033:0x457569 [ 321.000845] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:22:07 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') socket$bt_bnep(0x1f, 0x3, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) [ 321.019734] RSP: 002b:00007f08e9e10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 321.027422] RAX: ffffffffffffffda RBX: 00007f08e9e10c90 RCX: 0000000000457569 [ 321.034674] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 321.041926] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 321.049178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9e116d4 [ 321.056432] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 0000000000000005 08:22:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000027c0)={&(0x7f0000002600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002780)={&(0x7f0000002680)={0xe4, r1, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x68}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x39b5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1ff}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x22f8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xd2ee}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) recvmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000300)=""/235, 0xeb}, {&(0x7f0000001540)=""/139, 0x8b}], 0x4, &(0x7f0000001600)=""/4096, 0x1000, 0x6}, 0x40000000) 08:22:07 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x3}, 0x0) 08:22:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000080)={0x20, 0x1, 0xe0a7, 0x6, 0x8, 0x81}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x1000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:07 executing program 2 (fault-call:14 fault-nth:30): pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x80ffffff, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:07 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xffffffb0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:07 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 08:22:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xffffffc0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:07 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgid(0x0) r4 = getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000640)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000006c0)=0x0) r7 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001280)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0}, &(0x7f00000013c0)=0xc) fstat(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001540)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000001640)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002d40)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002d80)={0x0, 0x0}, &(0x7f0000002dc0)=0xc) stat(&(0x7f0000002e00)='./file0/file0\x00', &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = gettid() lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002f80)='./file0/file1\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f00000030c0)={&(0x7f0000000600)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1000000}, 0xc, &(0x7f0000002cc0)=[{&(0x7f00000009c0)={0x4ac, 0x37, 0x200, 0x70bd28, 0x25dfdbff, "", [@generic="3394e642501c316a155472cbb7349d6f554d38f496fc10c0aff405e46bbf67193a6af3bdf8a9", @typed={0xc, 0x39, @u64=0x8}, @typed={0x4, 0x23}, @nested={0x2b4, 0x7e, [@typed={0x4, 0x48}, @generic="b58f3b0a3c64c437f5848a54052512940e6f243e784b39008dd18563a8980a302a40c212d5cfa51b7b4543a179b56d8af41c5b5f65877e2de9ecbfa86cd5eea5cf0d669e812724c52af96d5cbe1abef3f375331dcf7b515f631a2b01cd3ddfe7a562b43a0c680013b4faf2ffd3584db1db0614d5b87048739b977fd46d96b749fc7beedb251a1de3cea750f6313bd24d57fd6ff111c613f9b68246246c0c292ffb9979e8b715b2824874a9e5f6b57da442add07c70dc43420cfaeaeb8dc65162c548af32d66c9d9eeaf0aa10bc5b86509a225cdffdd915d0b7eb502bf8076232aae9", @typed={0x4, 0x48}, @typed={0x8, 0x53, @fd=r0}, @generic="c21c44aa419692d12959efcb504cf425b0880e560b68a7d4e1760634a7a3642bf841c75256d4f836999bc1f0d118465612b7418e6bbf9ada4a0d72ed9e0581abbf60b8bddc373c348acfe2c524bf87ceb2b0d2f2555664b40b23762ca9030ec3f2109f92d3ae1060d3348b8d9d339cff00108dc7c314df543811548d8117ba769f8982f22394e27c361678aa5ba47bfa20bca866ab0f0995fdad1ae6e68eee228d4a77013b74f76d28a87329b60748abadb47dde8d80ac22f46af5e743867b52c37ea3f5", @typed={0xf8, 0xe, @binary="6171d89734dd18419aa099421c5b0ea5ec7b5df64da6ce03cc9ade2ecb43166436f24a30573342bc4b059f4bb3b07775f2383c2fc0f60908b17825e6c957bafa83b9368dd47848b1ece00a1defebdb10fbe92b94f3cebe25a312c89e6fb00c5fb1c422d6bb4b03268323e925607c2cdd592143f299e4bfd0afca9d5a9f623609088cb6d4cc6094a9faca47a1dd3a983db20eb1683f0dfc91ba28ec01a70180af292157007fc3d14cfa4960600610f046cca6302a5150d998e38570b457972efacc280194a5dd51881b61aa20023852c8796a9fefca0f052c372d5a27a68843a4a9ad1680bfaa1e0af049cd8bc29e2a834528"}]}, @nested={0x140, 0x81, [@generic="e8e716dec8039f84b7cb4c191e36f7b9d283918819bad41223b83d5cb78467ea6c5140e0bfc8b5f3bc98e0cadf9495b0126882705f2146cad11cf9d2fd88e7c05c956d2b70dc7edc90737ae4f4bb31e1b44348c1d51bfbd684ab1e1d897ef40d99fc986b", @typed={0xc, 0x6c, @str='noextend'}, @generic="f7cdbf4c7b9677f1317c2f8feaf971162fcac5", @typed={0x8, 0x73, @pid=r3}, @typed={0xc, 0x22, @u64}, @generic="9ff3364ea5e5da21621f53d698c98294e42151d729379cde5e71b9bc0f74732e92e3a1f69db0a58c88b95282158ebca6308ce527f8da962c1a71e21f6569e04351d0544f8c52679bbdb51393592e6ac37d581960d2c6824539201ad945f8ed21bf8a35e5ffa18d7e528691a74caec94f34afa21576ff8ba9d6633bbd32c1d35a649f4ed0fb40626e093fb62f318f4df28807be6619b02e1e139e24", @typed={0x8, 0x95, @pid=r4}]}, @typed={0x70, 0x73, @binary="50d8efc545bfb6cc9b501c3ee813c978876d85537a56dce7aec3a02412f6b1444e010209c79b163de42da705dd31ad45efc1ce84131c343a0d309e2a545304597d73c7bfe30786411322483e81768ff7898e7c701ab62e3a0fa342ae56a9fdf71d6b57fc1cec6cb9459e7db5"}]}, 0x4ac}, {&(0x7f0000000e80)={0x3e8, 0x25, 0x8, 0x70bd28, 0x25dfdbff, "", [@typed={0x8, 0x75, @pid=r5}, @typed={0xc, 0x20, @u64}, @nested={0x220, 0x19, [@generic="ccca8e12f763e330670f736f37e8f5ddf0692a99a17241e96aef2d820b289174a4ed78efc9e9d43a21d81a7e4ba6e9ea5ed8c17129d03cf03a77526fcc65b619c1dac38e74383fbc53667339d0e164952fbe746e7e74902c22fc431eb608a25d1fa7dc7e6c4405651d5aeb7298c02c23957118f80e1f1dfbdbc524fefd41c314304e0e2c218035496908d8651bc174e7eb2a6f002f011ee6dd6d867b4fad1ee0aa03b055aed93c386ed29aafc5cf7f46166aa1cab76ae7ee740d1ee9e9d48876269988aa9573b71c9c1281e96d621672ce71e557e063100da7337c3ab53c4d0a", @typed={0x14, 0x3, @ipv6=@local}, @typed={0x8, 0x4, @fd=r0}, @generic="ec755b9241427ccb2429468068e5560f41760dbf1586585247657a7971ec0e3f00545ee0cf741d849c7bc0d8aacaad41fed65bb4e3dc3fab2d035c4302a5e5567297ac78af6ca311e18b031534de5c36dda5b26558a7402c491f1b84", @generic="9b23dbe6586321d995d8aa3ca652ff7c61e36c8703e2bf8eb11b359b7594b210e2f230fed9dc52b385b71c6671e718a22da2ce0023d4d41f3d8fa092b97d86aa1fe746206819a18596c0d91ec764a6943921cb6cec07f4737b38c2332cb68e4bba487366f3923dc8aeefcbb973ae898b4a021690da66a8d3de776c64f8cb38d14c8f190c8d6bc5d2ca62cba823f4142e75905cfd7acf8058030996d016103a46f740", @typed={0x8, 0x42, @u32=0xd396}, @generic="149b224dc37aa2d33fa6f6df42874e0d65", @typed={0x8, 0x1e, @pid=r6}]}, @typed={0x14, 0x54, @ipv6=@remote}, @nested={0x190, 0x71, [@generic="dba252161d1f139b527f753eb13c314d0009923122355224ad024cecfdf912d20cd0c348cd4c73364beb2611422dfe6c0bfefca7d0387d7a0509d5976dcc8e2e9919e838b41324af875956ac5e6b11f907851ae5ae98adb1c7e04e0de4fae4efc8aab598d816f31534694be960eab2f0296dc90cafd0f2e87cc8994a107abd52099f89880455c0bd0ee9b54f73ae8a4744d9a40ab4b7ff00f7a1ad61d3103667518ef3789535d2fa63ea8e00619ba9c43e7bde24d331aeb2e3d20984e3d4f5bc0fe3040d3805a1865d3035843ab9b78a77136937ad23cde33731", @generic="28df4da49dc0dbd7363a990c72594ebc472a0c8a16dc8c9738c4068512dd8ab56d566d82486733412c79cbfcb7969e7fd75d7f366de49593e9443de2d2e75b95c17da85bbf1e188a757db79e267438fa3d", @generic="eca0386652e8eff72495f0be832bd5c7c0e1d8e77b6581d7490c7b7dc33f26da11c955dbc5f5b0b29c8e35089448b6ab6d", @generic="dbe2cdcd4bced4b07f1dbfd6200ed7726dee9d51dbbc4b66c1cd1f772d50899a60ec2783f2", @typed={0x8, 0x7, @ipv4=@local}]}]}, 0x3e8}, {&(0x7f0000001680)={0x334, 0x1d, 0x100, 0x70bd25, 0x25dfdbff, "", [@typed={0x4, 0x1d}, @generic="4f6971e50f8998cf9d1d6822037542d5e6f56c3fd0dfbf0f85bbcd1a5179120b8c9a3a472ffdf7419db8f959310986aea19906412f666e7c31d7870a04e55ce59b415ad79b2218d0acaeba2b7916cc0a101fc3120ce4316c217ae87247817fb8e0adbedfb5118e51750304f6682570fb431dde0344b03e29518ac239f47759f519310449691dd187b1befc82212a3874c2640c6914e087eb", @generic="c92d28e775ef61472f28db40713ae249c03e9f00f678ff8fd019", @typed={0x8, 0x37, @u32=0xffff}, @typed={0x24, 0x22, @binary="c118dbf1305989ca18e82205073a1b2fef603894367a2c2e38039a58de624d5c"}, @nested={0xc0, 0x19, [@typed={0x8, 0x23, @uid=r7}, @typed={0x8, 0x6e, @uid=r8}, @typed={0x8, 0x7d, @uid=r9}, @typed={0x8, 0x64, @uid=r10}, @generic="4d252de02005ecc669be9d30874ed2ab977cf448911fea24abf1fbdc7f2fa286c4e4f09e2562b730c2a8a2b744fca736dd29505c926c85545e14d816810e91b91fb71627f3d33fde1e4145e9556c64ee8e61c3ffb2605f4906d387adc3bbd0ba2d431917847001efe23d08de57297674309eb644523309c72a831631d2d02e0bd49a5e1d68ab82a53bf599ff4cbb9c2799b33a", @typed={0x8, 0x1e, @uid=r11}]}, @typed={0xc, 0x6d, @str='vcan0\x00'}, @nested={0x34, 0x1f, [@typed={0x4, 0x55}, @typed={0x10, 0x11, @str='cgroup^GPL\x00'}, @typed={0x1c, 0x8f, @binary="685539862010ac2043fb299dc400f48cc32ee2a8ca"}]}, @nested={0x38, 0x4b, [@generic="4186bcc208f7043335b679f0a3092e8bc113725c35c718d74dd307a1a4a6f1c64275ee8bbc3dc0", @typed={0xc, 0x1f, @u64=0x2}]}, @nested={0x108, 0x39, [@typed={0xfc, 0x2b, @binary="53383fc380ed994abb5bb55f7c83b1a16ea8301f81d931781b092d7c9c7d780df82ba6d5e605f4d9a62e4e536d945233e267837b85948a64788e8ac7e95f0f1e047ceff05c41a1bd17c337c07e013302c71bc4c08e2c72d82a3fb805e6562c40130c05216ea6ca798564bd1bea3784768a911b8331d67640534b1038aa90d3160bf2d129e19fc68576e85344ea6e81e2156261e39daf84827b24b377283c39aa42b054fb148e16d078b5b14b5fc41e2d0102ff588da7c01bca15ae8d990cdc421a3def260beead7d2278b85f4d3fdd3eb18f508b7d933036374d8d0af3d9cb6ecc6d27753a71a699859ea4b89649cf9c01a5bf9ede0579"}, @typed={0x8, 0x7b, @uid=r12}]}]}, 0x334}, {&(0x7f00000019c0)={0x1c, 0x39, 0x6, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x73, @u64=0x100000000}]}, 0x1c}, {&(0x7f0000001a00)={0x11e0, 0x3c, 0x500, 0x70bd2a, 0x25dfdbfd, "", [@generic="13994657977d071151e3d358dc8e338f1ad53bbbdcc5254b5c598d71251b3f437f2a3234739e54ce1c955f84c2a3ef6b8321bc20ea69ef3bacac9c530b1ba85b38276a6ff2e5187dced5db8c9c27ea3f0535787db77182a43c60a150dfda9b27279fe215cbb8601372f0c0afa5494beefffab5d57c43dd0af7d439b9bf1491af66a150948e7e1b322d870eeebe25c4c8436913972a42839fd3923ce04b2c15aba0f0656df54ce29acfbcb4650d057ff7fe2a2df75163e136b8746d4aec9fdf4f", @generic="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", @generic, @typed={0xd8, 0x1f, @binary="ff700771c953f6732b3a4e4a6af1795a871a8606d526e1e80a90a0f46d6c7755cfaa4b5f00017a9faaf6c49dd417cca059330a13622a04be3bbe35d30c07cc7b3084920df4d99fc8ee4c5992cb95bbc359bdd4aab0ef2e2abb2c0d044c81d236c6a58bfb8cba4ec97a3af155451053f78aa5b92aa83d5f76cec195867e5642fe2877c740c27d2d4f8c3da1af4cec3a29ee79a45265a36165269ced6a81c275cd9af412c6129d370759c8dba1cd41d77e8c08eb97fa68e52e1e5d90e298bd156318b2f8bd2216c1199fd3261861d5ce18671901"}, @typed={0x38, 0x1f, @binary="748fdbabe469ca025680bdd76c7604d6fed7e45c04bfa1fb6aa7c43251ed3f2c0231a75a4036efab9ead4bb6cfb11a0b46b843"}]}, 0x11e0}, {&(0x7f0000002c00)={0xac, 0x1c, 0x330, 0x70bd29, 0x25dfdbfc, "", [@typed={0x28, 0x7a, @binary="32ce3cfc7970f6f912c9f1fffbd1b9d0a5f349f1c6c48ebbd85d39bcf52303983e5114"}, @typed={0x6c, 0x4d, @binary="81a9a714a334dcadda6a3497c1cbb63bfb42816d3cf069eec5a3ded7eeff220519e38a047253732a17e1a4e09e3aeb4aca6c1a0817c06b8dcaf7eea2ec37f426eb5ae89f6f02da029e8dc38b1800520430ca482cc8bd77aa358ef2f9892cbd84d0faf38d87feffee"}, @typed={0x8, 0x4, @u32=0x3}]}, 0xac}], 0x6, &(0x7f0000003040)=[@cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x20, 0x1, 0x1, [r0, r1, r0]}], 0x60, 0x40000}, 0x10) r19 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) setsockopt$inet_mreqn(r19, 0x0, 0x23, &(0x7f00000002c0)={@empty, @empty, r20}, 0xc) 08:22:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x80ffffff00000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000000c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000080)=""/54, &(0x7f0000000100)=0x36) 08:22:07 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x300000000000000}, 0x0) 08:22:07 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x15b) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:07 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x8a6) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) r2 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='$\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000300)='trusted\x00', &(0x7f0000000340)='loem1/nodevmime_type$:system\\\x00') 08:22:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x6c000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:07 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) fcntl$getflags(r0, 0x401) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:07 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x60000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:08 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x100, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000000c0)={0x7028, 0x5, 0x40, 0x2}, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x200, 0x20, 0xa47, 0x3, 0x0, 0x3f, 0x1512, 0x6, 0x1, 0x1, 0x7, 0x3, 0x3, 0xffff, 0x5, 0x20, 0x1f, 0xfffffffffffffeff, 0xffffffffffffff00, 0xacd, 0x7f, 0xae7, 0x2, 0x4fc, 0x80, 0x1, 0x1000000, 0x2, 0x1, 0x1800000, 0x20, 0x0, 0x9, 0xcdae, 0xfff, 0x1, 0x0, 0x400, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x20, 0x7, 0x1, 0x0, 0x76, 0x101, 0x1}, r2, 0x0, r0, 0x9) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:08 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0xfe55) write$P9_RWALK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r2, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r2, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r2, &(0x7f00000006c0)={0xffffffffffffffd4, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r2, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r2, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0xc000) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000000080)={0x53, &(0x7f0000000600)="f144e40bf33eb3e3401f16d55f640ee3d60c0d28df468189dd163c172814125de321549ed94008f37a7bc468a1d52de040ba7d40a30ffd70bb40d46269fcf3fca4e1d2d65d051f09e6da3a62b449ebda78f527"}) write$P9_RGETATTR(r2, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x40000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x6, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:08 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x0}, 0x0) 08:22:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xa00000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:08 executing program 1: init_module(&(0x7f0000000540)="6c6f655edd38d9aa607522ef976d655f74797065243a73797374656d5c00", 0x1a0, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r0, 0x0, 0x89, &(0x7f0000000080)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", r3}, 0x30) 08:22:08 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000600)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) stat(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000c40)={{}, {0x1, 0x1}, [{0x2, 0x1, r2}, {0x2, 0x4, r3}, {0x2, 0x7, r4}], {0x4, 0x3}, [{0x8, 0x5, r5}, {0x8, 0x7, r6}], {0x10, 0x3}, {0x20, 0x3}}, 0x4c, 0x2) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:08 executing program 0: rt_sigpending(&(0x7f00000000c0), 0x8) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/rtc0\x00', 0x10400, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000b40)={r0}) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r2 = dup(r0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200000, 0x0) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000140)={0x4, 0x1000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000640)={0xa6be021283c610, 0x70, 0x3, 0x6, 0x2ac, 0x1, 0x0, 0x2, 0x2, 0x2, 0x5, 0x40, 0x1000, 0x2, 0x10000, 0x8, 0x0, 0x5, 0x1f, 0x40, 0x1, 0x254a, 0x10001, 0x9, 0x3, 0xfffffffffffff801, 0x9, 0x4, 0x273f, 0x8001, 0x5, 0x7, 0x7, 0x43, 0x4, 0x1, 0x7a, 0xda, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x6}, 0xa000, 0x5, 0x200, 0x3, 0x1ff, 0x400}, r1, 0x2, 0xffffffffffffff9c, 0x2) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x100000001, 0x5, 0x45, 0x6441, 0x0, 0x1f, 0x0, 0x9, 0x2, 0x5, 0x400, 0x8, 0x4, 0x9, 0x3, 0x8, 0x1, 0x7, 0xe4cf, 0x1, 0x0, 0x0, 0x1000, 0x3ff, 0x80, 0x7, 0xffff, 0x1, 0x68b4e57c, 0x0, 0x3, 0x7, 0xc800, 0x6, 0x4, 0x7f, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000300)}, 0x0, 0x10000, 0x5, 0x4, 0x8, 0x9cc1, 0xd91}, r4, 0x4, 0xffffffffffffff9c, 0x5) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000480)={0x5, 0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f00000004c0)={0x4, r5}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', r4}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000500)=0x1000, 0x4) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000700)={0x5, 0x40, 0x6}) r6 = memfd_create(&(0x7f0000000580)='#$.vmnet0!\x00', 0x2) setsockopt$bt_BT_FLUSHABLE(r6, 0x112, 0x8, &(0x7f00000006c0)=0x9c, 0x4) r7 = semget(0x2, 0x1, 0x0) semctl$SETVAL(r7, 0x7, 0x10, &(0x7f0000000540)=0x9) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x7000000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:08 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$binfmt_elf32(r1, &(0x7f00000009c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1000, 0x100000000, 0x10000, 0xffffffff, 0x468, 0x3, 0x3, 0xfffffffffffffffc, 0x3ca, 0x38, 0x231, 0x80, 0x8, 0x20, 0x2, 0x0, 0x6, 0x9}, [{0x3, 0x1, 0x2, 0x80, 0x2, 0x4, 0xd18, 0xeb}, {0x3, 0xf97, 0x7fff, 0xff, 0xffffffff7fffffff, 0x1fffffffe00, 0x9, 0x8}], "2db9b479256bd70d453e3b87272bf3f37779adfaba904817f2b9eb2bc1beb754fb053ff44f4a04bed8d8e3d144ad6cf6a18225d26730310395af37bfc6ab261c3027b24b00fb770e433796ed1c0827d60efa7e39bf4cd4db803c8cee1c629d91121bf80b7888b11aa26f8c35c40b19bf66f5b096e62bddd6bcb35d1e6dd910bce9099a807a05d4310c04ae7613fcaa54151bec3913c0dbbb5fe595e50588b8e73367adbaa1b95e61ed9e19f2ceae", [[], [], [], [], [], [], [], [], [], []]}, 0xb26) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:08 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x2) 08:22:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/91) 08:22:09 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) r1 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r1, 0x0, &(0x7f0000000040)) 08:22:09 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000003c0)={r2, 0x4, 0xdac, 0x0, 0x5, 0x7e0000, 0x3, 0xffffffff, {r3, @in={{0x2, 0x4e21, @rand_addr=0x3ff}}, 0x101, 0x6, 0x5f6, 0x97, 0x1bdaa002}}, &(0x7f0000000140)=0xb0) 08:22:09 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x0}, 0x0) 08:22:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xa0ffffff00000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:09 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000006c0)=0xc) r5 = fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000bc0)=0x0) lstat(&(0x7f0000000c00)='./file0/file1\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000cc0)={0x0, 0x0}) r10 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0, 0x0}, &(0x7f0000000d40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000d80)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000dc0)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000ec0)=0xe8) r14 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000f40)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000f00)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000010c0)={0x0, 0x0, 0x0}, &(0x7f0000001100)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001140)={0x0}, &(0x7f0000001180)=0xc) r19 = geteuid() r20 = getegid() sendmsg$netlink(r2, &(0x7f00000012c0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x2010}, 0xc, &(0x7f0000000780)=[{&(0x7f00000009c0)={0x1e0, 0x3b, 0x200, 0x70bd25, 0x25dfdbfc, "", [@typed={0x8, 0x84, @uid=r3}, @generic="413a61f590d22cedfc5607f309180338897bfa5119029f4ea6784d0bb24b44065bf3cf6082cf8547f749b8a4590a4316f8324d998558cd4ebf9cb6d84115ca64b6f6f4419fa0ceca18926290052b8e2a214dbb3fe236fa81afbd591a36b097e49aa84d6136c72f8825a7c9f67c27f64228eac64110465e30c97d16ed336d24cd", @generic="ceb29018f972fb439389461958b936c48d224b9ca2566e6603ad95e582de9a2196e970b733cfcb8842e9f1a0cc7a293fe02ad3bb359ceda8c4a3c1c6b41ebcd980d2f80faff3551f79e06ff250ec3d4609cf65e3eeaf21e9b00e80eefad063457db7e20805d59f27342259d7eb15950c19bdcc408d0c82680b117159a58483371d77bf421592b74bbdb7bf99d728c6e5d6df5268d75d5498981a34e2505c531a83a01f0918c9d30a7fa565eaca5709208914fcf4f11f048ef6dfe1316e0aebaac6467f135e97d68f6fc36dd6891c0af1fa8194f018ced66a3b73d66f3b9717ee3e65b49e2ab2b2520852f577420ab7d8751382c72b00", @typed={0x8, 0x35, @uid=r4}, @nested={0x48, 0x72, [@typed={0xc, 0x34, @u64=0x9}, @generic="2b1a61cb02be929b832b306aebbc0701d88cf160049c76cf3e5bcc64e77c11584c8e5a89c74e6c06f0402e8d9a", @typed={0x8, 0x73, @pid=r5}]}]}, 0x1e0}], 0x1, &(0x7f00000011c0)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x20, 0x1, 0x1, [r1, r1, r0]}], 0xf0, 0x44000}, 0x40000) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff, 0x40) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x236, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x28000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x20, r1, 0x501, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008800}, 0x4008005) gettid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:09 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000540)={"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"}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x9, 0x401, 0x0, 0x100}, {0x8b6, 0x53, 0x9, 0xff}, {0x7, 0x0, 0x2, 0x3}]}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x20000000, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:09 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e101e696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000094a3feec"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x142) name_to_handle_at(r2, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000600)={0xff, 0x8001, "d97e17cfd298103dfb0d25d32482122d0c60c480397b3130edfdc9239e96be6a7f9dc8c1856ca84ca68dd0a5f1d9d23986bb9a2528e603664b688c3669753a71f064bb639683de9fae0a265972f76183a3362ebc6b8147119363257c15dea953e0d53584de41076ee5a836c76a4dd11409274a1dcc18ac7f636a3e6154db56642c57398ae8c403afb8253c3f8a27dc7ddefd2deb2f9bd72a42ad3fcea24b6f5a37bda3ad56f89e4991794eea8144606c1d338f62ec93d7e29a57423bbb543f560f3cba8af3454fd185bef8e60c2c7ffed098a7d69a55f87bc0a38605c21e50759a61dae8319a6306098c0fd09d70733092d923bd19a062"}, &(0x7f0000000340), 0x400) write$P9_RGETATTR(r1, &(0x7f00000009c0)={0x40b, 0x19, 0x1, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}}, 0xa0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 08:22:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200000, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f00000000c0)=0xffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x600, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0xe, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x68, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:10 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x70, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) 08:22:10 executing program 1: init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) mknodat(r2, &(0x7f0000000100)='./file0\x00', 0x20, 0x20) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x10200, 0x0, &(0x7f0000ffb000/0x4000)=nil}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)=0x801) dup3(r0, r0, 0x80000) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) 08:22:10 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000640)={0x0, 0xc7b, 0x0, 0x0, 0x42e, 0x8}, &(0x7f0000000680)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2, 0x0, 0x0, 0x0}, 0x0) 08:22:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x800a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x801) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x60) 08:22:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x89, &(0x7f00000002c0)='loem1/nodevmime_type$:system\\\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0x0, 0x1, {{0xb7, 0x8, 0x9, 0xe, 0x5, 0xa02, 0x7f, 0x8}}}, 0x60) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x801) 08:22:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x700, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x4e5f]}, 0x48) [ 474.173106] INFO: task syz-executor2:11570 blocked for more than 140 seconds. [ 474.180412] Not tainted 4.19.0-rc7+ #58 [ 474.185123] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 474.193108] syz-executor2 D25400 11570 5304 0x00000004 [ 474.198730] Call Trace: [ 474.201305] __schedule+0x86c/0x1ed0 [ 474.205113] ? __sched_text_start+0x8/0x8 [ 474.209276] ? graph_lock+0x170/0x170 [ 474.213062] ? print_usage_bug+0xc0/0xc0 [ 474.217157] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 474.222945] ? kasan_check_read+0x11/0x20 [ 474.227138] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 474.232427] ? find_held_lock+0x36/0x1c0 [ 474.236523] schedule+0xfe/0x460 [ 474.239952] ? __schedule+0x1ed0/0x1ed0 [ 474.243977] ? lockdep_hardirqs_on+0x421/0x5c0 [ 474.248556] ? trace_hardirqs_on+0xbd/0x310 [ 474.252856] ? kasan_check_read+0x11/0x20 [ 474.257032] ? __rwsem_down_write_failed_common+0x8db/0x1670 [ 474.262827] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 474.268311] ? kasan_check_write+0x14/0x20 [ 474.272532] ? do_raw_spin_lock+0xc1/0x200 [ 474.276836] __rwsem_down_write_failed_common+0xbb9/0x1670 [ 474.282461] ? rwsem_spin_on_owner+0xa30/0xa30 [ 474.287082] ? __lock_acquire+0x7ec/0x4ec0 [ 474.291314] ? mark_held_locks+0x130/0x130 [ 474.295605] ? mark_held_locks+0x130/0x130 [ 474.299829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.305397] ? security_inode_permission+0xd2/0x100 [ 474.310409] ? inode_permission+0xb2/0x560 [ 474.314681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.320212] ? link_path_walk.part.40+0xcbb/0x1530 [ 474.325183] ? pick_link+0xaf0/0xaf0 [ 474.328883] ? graph_lock+0x170/0x170 [ 474.332664] ? dput.part.26+0x26d/0x790 [ 474.337098] ? shrink_dcache_sb+0x350/0x350 [ 474.341408] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 474.346450] ? __check_object_size+0xb1/0x782 [ 474.350935] ? lock_acquire+0x1ed/0x520 [ 474.354934] ? lock_rename+0x236/0x290 [ 474.358808] ? lock_release+0x970/0x970 [ 474.362762] ? arch_local_save_flags+0x40/0x40 [ 474.367370] rwsem_down_write_failed+0xe/0x10 [ 474.371847] ? rwsem_down_write_failed+0xe/0x10 [ 474.376558] call_rwsem_down_write_failed+0x17/0x30 [ 474.381593] down_write_nested+0xa9/0x130 [ 474.385769] ? lock_rename+0x236/0x290 [ 474.389640] ? _down_write_nest_lock+0x130/0x130 [ 474.394380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.399946] ? __sb_start_write+0x1b2/0x370 [ 474.404256] lock_rename+0x236/0x290 [ 474.408002] do_renameat2+0x696/0x1180 [ 474.411898] ? user_path_create+0x40/0x40 [ 474.416081] ? kasan_check_read+0x11/0x20 [ 474.420222] ? _copy_to_user+0xc8/0x110 [ 474.424180] ? put_timespec64+0x10f/0x1b0 [ 474.428413] ? nsecs_to_jiffies+0x30/0x30 [ 474.432559] ? do_syscall_64+0x9a/0x820 [ 474.436580] ? do_syscall_64+0x9a/0x820 [ 474.440547] ? trace_hardirqs_on+0xbd/0x310 [ 474.444883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.450473] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.456055] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 474.461499] __x64_sys_rename+0x5e/0x80 [ 474.465677] do_syscall_64+0x1b9/0x820 [ 474.469558] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 474.474905] ? syscall_return_slowpath+0x5e0/0x5e0 [ 474.479971] ? trace_hardirqs_on_caller+0x310/0x310 [ 474.484977] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 474.490024] ? recalc_sigpending_tsk+0x180/0x180 [ 474.494775] ? kasan_check_write+0x14/0x20 [ 474.499041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 474.503873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.509086] RIP: 0033:0x457569 [ 474.512278] Code: 83 c4 18 c3 e8 d8 64 00 00 48 8b 04 24 48 8b 4c 24 08 48 89 01 e8 d7 2d fc ff e8 22 7a fc ff b8 02 00 00 00 48 8d 0d 6a 60 09 <01> 87 01 8b 05 62 60 09 01 83 f8 01 0f 85 8a 00 00 00 b8 01 00 00 [ 474.531220] RSP: 002b:00007f08e9dcec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 474.538940] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457569 [ 474.546259] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 474.553521] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 474.560839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08e9dcf6d4 [ 474.568126] R13: 00000000004c3281 R14: 00000000004d4e78 R15: 00000000ffffffff [ 474.575392] [ 474.575392] Showing all locks held in the system: [ 474.581823] 1 lock held by khungtaskd/982: [ 474.586036] #0: 00000000b3d74ca2 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 474.594731] 1 lock held by rsyslogd/5142: [ 474.598886] #0: 0000000057753203 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 474.606902] 2 locks held by getty/5232: [ 474.610855] #0: 000000009a6d743d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 474.619126] #1: 00000000a571461e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 474.628000] 2 locks held by getty/5233: [ 474.631946] #0: 00000000a74925c4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 474.640205] #1: 000000005934d92c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 474.649060] 2 locks held by getty/5234: [ 474.653005] #0: 00000000661388f9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 474.661268] #1: 0000000027c652b1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 474.670140] 2 locks held by getty/5235: [ 474.674086] #0: 000000000eb20a04 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 474.682355] #1: 000000008485091b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 474.691212] 2 locks held by getty/5236: [ 474.695171] #0: 00000000690afca2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 474.703439] #1: 00000000dec50fbf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 474.712299] 2 locks held by getty/5237: [ 474.716248] #0: 00000000eeee51f4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 474.724514] #1: 000000009ff78ef0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 474.733405] 2 locks held by getty/5238: [ 474.737355] #0: 0000000044b21f90 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 474.745634] #1: 000000003d2de951 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 474.754525] 4 locks held by syz-executor2/11530: [ 474.759529] #0: 000000007f28151e (sb_writers#15){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 474.767517] #1: 000000005b930021 (&sb->s_type->i_mutex_key#23/1){+.+.}, at: lock_rename+0x236/0x290 [ 474.776828] #2: 00000000127fb7fc (&sb->s_type->i_mutex_key#24/4){+.+.}, at: lock_two_nondirectories+0xdd/0x120 [ 474.787298] #3: 00000000452005fa (&v9ses->rename_sem){++++}, at: v9fs_vfs_rename+0x330/0xd30 [ 474.796047] 2 locks held by syz-executor2/11570: [ 474.800805] #0: 000000007f28151e (sb_writers#15){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 474.808831] #1: 000000005b930021 (&sb->s_type->i_mutex_key#23/1){+.+.}, at: lock_rename+0x236/0x290 [ 474.818111] [ 474.819781] ============================================= [ 474.819781] [ 474.826774] NMI backtrace for cpu 1 [ 474.830433] CPU: 1 PID: 982 Comm: khungtaskd Not tainted 4.19.0-rc7+ #58 [ 474.837253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.846599] Call Trace: [ 474.849273] dump_stack+0x1c4/0x2b4 [ 474.852901] ? dump_stack_print_info.cold.2+0x52/0x52 [ 474.858085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.863603] nmi_cpu_backtrace.cold.3+0x63/0xa2 [ 474.868250] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 474.873418] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 474.878678] arch_trigger_cpumask_backtrace+0x14/0x20 [ 474.883843] watchdog+0xb3e/0x1050 [ 474.887379] ? reset_hung_task_detector+0xd0/0xd0 [ 474.892201] ? __kthread_parkme+0xce/0x1a0 [ 474.896418] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 474.901502] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 474.906582] ? lockdep_hardirqs_on+0x421/0x5c0 [ 474.911144] ? trace_hardirqs_on+0xbd/0x310 [ 474.915440] ? kasan_check_read+0x11/0x20 [ 474.919568] ? __kthread_parkme+0xce/0x1a0 [ 474.923781] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 474.929209] ? kasan_check_write+0x14/0x20 [ 474.933420] ? do_raw_spin_lock+0xc1/0x200 [ 474.937640] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 474.942723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 474.948237] ? __kthread_parkme+0xfb/0x1a0 [ 474.952467] kthread+0x35a/0x420 [ 474.955819] ? reset_hung_task_detector+0xd0/0xd0 [ 474.960640] ? kthread_bind+0x40/0x40 [ 474.964429] ret_from_fork+0x3a/0x50 [ 474.968228] Sending NMI from CPU 1 to CPUs 0: [ 474.972820] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x6/0x10 [ 474.973768] Kernel panic - not syncing: hung_task: blocked tasks [ 474.986527] CPU: 1 PID: 982 Comm: khungtaskd Not tainted 4.19.0-rc7+ #58 [ 474.993351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.002684] Call Trace: [ 475.005259] dump_stack+0x1c4/0x2b4 [ 475.008869] ? dump_stack_print_info.cold.2+0x52/0x52 [ 475.014043] ? printk_safe_log_store+0x2f0/0x2f0 [ 475.018781] panic+0x238/0x4e7 [ 475.021954] ? add_taint.cold.5+0x16/0x16 [ 475.026082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.031620] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 475.037052] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 475.042490] watchdog+0xb4f/0x1050 [ 475.046015] ? reset_hung_task_detector+0xd0/0xd0 [ 475.050839] ? __kthread_parkme+0xce/0x1a0 [ 475.055058] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 475.060143] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 475.065227] ? lockdep_hardirqs_on+0x421/0x5c0 [ 475.069790] ? trace_hardirqs_on+0xbd/0x310 [ 475.074091] ? kasan_check_read+0x11/0x20 [ 475.078217] ? __kthread_parkme+0xce/0x1a0 [ 475.082430] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 475.087857] ? kasan_check_write+0x14/0x20 [ 475.092070] ? do_raw_spin_lock+0xc1/0x200 [ 475.096282] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 475.101361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 475.106874] ? __kthread_parkme+0xfb/0x1a0 [ 475.111087] kthread+0x35a/0x420 [ 475.114433] ? reset_hung_task_detector+0xd0/0xd0 [ 475.119261] ? kthread_bind+0x40/0x40 [ 475.123043] ret_from_fork+0x3a/0x50 [ 475.128035] Kernel Offset: disabled [ 475.131660] Rebooting in 86400 seconds..