0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:08 executing program 6 (fault-call:4 fault-nth:71): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:08 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f00000001c0)={[{0x7fff, 0xfff, 0x8, 0x10000, 0x9e93, 0xfffffffffffffffe, 0x200, 0x3, 0x7726, 0x972, 0x7f, 0x7, 0x331}, {0xffffffffffffffff, 0xfffffffffffffff9, 0x5, 0xff, 0x306f, 0x1, 0x8, 0x0, 0xffffffffffffff00, 0x800, 0x1, 0x100, 0x5}, {0x8bd4, 0x7, 0x9, 0x7a58, 0x9268, 0x1, 0x63, 0x7, 0xfffffffffffffffd, 0x8, 0x7ff, 0x101, 0x2}]}) close(r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) r4 = inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x80000c40) inotify_rm_watch(r3, r4) 11:47:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542b, &(0x7f0000000000)) [ 483.131083] FAULT_INJECTION: forcing a failure. [ 483.131083] name failslab, interval 1, probability 0, space 0, times 0 [ 483.142423] CPU: 1 PID: 27513 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 483.149785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.159131] Call Trace: [ 483.161718] dump_stack+0x1c9/0x2b4 [ 483.165349] ? dump_stack_print_info.cold.2+0x52/0x52 [ 483.170545] ? kasan_check_write+0x14/0x20 [ 483.174793] ? __init_rwsem+0x1cc/0x2a0 [ 483.178783] should_fail.cold.4+0xa/0x1a [ 483.182859] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 483.187985] ? graph_lock+0x170/0x170 [ 483.191787] ? find_held_lock+0x36/0x1c0 [ 483.195855] ? find_held_lock+0x36/0x1c0 [ 483.199930] ? __lock_is_held+0xb5/0x140 [ 483.204012] ? check_same_owner+0x340/0x340 [ 483.208337] ? rcu_note_context_switch+0x730/0x730 [ 483.213273] __should_failslab+0x124/0x180 [ 483.217970] should_failslab+0x9/0x14 [ 483.221780] kmem_cache_alloc+0x2af/0x760 [ 483.225940] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 483.230526] ? kasan_check_write+0x14/0x20 [ 483.234766] ? do_raw_spin_lock+0xc1/0x200 [ 483.239015] __d_alloc+0xc8/0xd50 [ 483.242477] ? fuse_iget+0x1e5/0x840 [ 483.246201] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 483.251224] ? fuse_change_attributes+0x870/0x870 [ 483.256070] ? _raw_spin_unlock+0x22/0x30 [ 483.260237] ? fuse_get_root_inode+0x129/0x1b0 [ 483.264819] ? fuse_iget+0x840/0x840 [ 483.268547] d_make_root+0x42/0x90 [ 483.272085] fuse_fill_super+0x128b/0x1ee0 [ 483.276327] ? fuse_get_root_inode+0x1b0/0x1b0 [ 483.280911] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 483.285940] ? cap_capable+0x1f9/0x260 [ 483.289841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.295380] ? security_capable+0x99/0xc0 [ 483.299530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.305069] ? ns_capable_common+0x13f/0x170 [ 483.309477] ? get_anon_bdev+0x300/0x300 [ 483.313536] ? sget+0x113/0x150 [ 483.316818] ? fuse_get_root_inode+0x1b0/0x1b0 [ 483.321397] mount_nodev+0x6b/0x110 [ 483.325024] fuse_mount+0x2c/0x40 [ 483.328485] mount_fs+0xae/0x328 [ 483.331856] vfs_kern_mount.part.34+0xdc/0x4e0 [ 483.336437] ? may_umount+0xb0/0xb0 [ 483.340061] ? _raw_read_unlock+0x22/0x30 [ 483.344206] ? __get_fs_type+0x97/0xc0 [ 483.348097] do_mount+0x581/0x30e0 [ 483.351642] ? copy_mount_string+0x40/0x40 [ 483.355880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 483.360641] ? retint_kernel+0x10/0x10 [ 483.364537] ? copy_mount_options+0x1f0/0x380 [ 483.369030] ? copy_mount_options+0x206/0x380 [ 483.373529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.379064] ? copy_mount_options+0x285/0x380 [ 483.383563] ksys_mount+0x12d/0x140 [ 483.387200] __x64_sys_mount+0xbe/0x150 [ 483.391175] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 483.396192] do_syscall_64+0x1b9/0x820 [ 483.400076] ? finish_task_switch+0x1d3/0x870 [ 483.404571] ? syscall_return_slowpath+0x5e0/0x5e0 [ 483.409503] ? syscall_return_slowpath+0x31d/0x5e0 [ 483.414439] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 483.419812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.424662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.429850] RIP: 0033:0x455a79 [ 483.433028] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.452399] RSP: 002b:00007f8f8b63ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 483.460107] RAX: ffffffffffffffda RBX: 00007f8f8b63f6d4 RCX: 0000000000455a79 [ 483.467373] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 483.474637] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 11:47:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x100, 0x0) mkdirat(r1, &(0x7f00000002c0)='./file0\x00', 0x10) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000080)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) fstatfs(r0, &(0x7f0000000180)=""/108) 11:47:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) fcntl$setflags(r1, 0x2, 0x1) 11:47:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x2, &(0x7f0000000000)) 11:47:08 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) close(r0) 11:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0xc, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:08 executing program 6 (fault-call:4 fault-nth:72): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 483.481903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 483.489168] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000047 [ 483.587106] FAULT_INJECTION: forcing a failure. [ 483.587106] name failslab, interval 1, probability 0, space 0, times 0 [ 483.598401] CPU: 1 PID: 27536 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 483.605763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.615115] Call Trace: [ 483.617716] dump_stack+0x1c9/0x2b4 [ 483.621358] ? dump_stack_print_info.cold.2+0x52/0x52 [ 483.626571] should_fail.cold.4+0xa/0x1a [ 483.630651] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 483.635770] ? __lockdep_init_map+0x105/0x590 [ 483.640274] ? graph_lock+0x170/0x170 [ 483.644082] ? find_held_lock+0x36/0x1c0 [ 483.648154] ? __lock_is_held+0xb5/0x140 [ 483.652227] ? check_same_owner+0x340/0x340 [ 483.656552] ? rcu_note_context_switch+0x730/0x730 [ 483.661483] __should_failslab+0x124/0x180 [ 483.665722] should_failslab+0x9/0x14 [ 483.669527] kmem_cache_alloc+0x2af/0x760 [ 483.673679] ? trace_hardirqs_on+0x10/0x10 [ 483.677919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.683473] fuse_alloc_inode+0x9e/0x510 [ 483.687629] ? fuse_dev_alloc+0x500/0x500 [ 483.691796] ? lock_downgrade+0x8f0/0x8f0 [ 483.695956] ? fuse_dev_alloc+0x500/0x500 [ 483.700111] alloc_inode+0x63/0x190 [ 483.703748] new_inode_pseudo+0x71/0x1a0 [ 483.707818] ? prune_icache_sb+0x1b0/0x1b0 [ 483.712061] ? find_inode.isra.19+0xc3/0x1d0 [ 483.716476] ? fuse_init_file_inode+0x70/0x70 [ 483.720989] new_inode+0x1c/0x40 [ 483.724357] iget5_locked+0x126/0x190 [ 483.728161] ? fuse_inode_eq+0x80/0x80 [ 483.732048] ? fuse_init_file_inode+0x70/0x70 [ 483.736547] fuse_iget+0x1d4/0x840 [ 483.740099] ? fuse_change_attributes+0x870/0x870 [ 483.744956] ? _raw_spin_unlock+0x22/0x30 [ 483.749123] fuse_get_root_inode+0x129/0x1b0 [ 483.753539] ? fuse_iget+0x840/0x840 [ 483.757268] ? _raw_spin_unlock_bh+0x30/0x40 [ 483.761687] fuse_fill_super+0x125d/0x1ee0 [ 483.765941] ? fuse_get_root_inode+0x1b0/0x1b0 [ 483.770529] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 483.775556] ? cap_capable+0x1f9/0x260 [ 483.779445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.784975] ? security_capable+0x99/0xc0 [ 483.789121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.794646] ? ns_capable_common+0x13f/0x170 [ 483.799047] ? get_anon_bdev+0x300/0x300 [ 483.803097] ? sget+0x113/0x150 [ 483.806369] ? fuse_get_root_inode+0x1b0/0x1b0 [ 483.810940] mount_nodev+0x6b/0x110 [ 483.814558] fuse_mount+0x2c/0x40 [ 483.818002] mount_fs+0xae/0x328 [ 483.821371] vfs_kern_mount.part.34+0xdc/0x4e0 [ 483.825950] ? may_umount+0xb0/0xb0 [ 483.829569] ? _raw_read_unlock+0x22/0x30 [ 483.833703] ? __get_fs_type+0x97/0xc0 [ 483.837581] do_mount+0x581/0x30e0 [ 483.841108] ? do_raw_spin_unlock+0xa7/0x2f0 [ 483.845507] ? copy_mount_string+0x40/0x40 [ 483.849760] ? copy_mount_options+0x5f/0x380 [ 483.854159] ? rcu_read_lock_sched_held+0x108/0x120 [ 483.859164] ? kmem_cache_alloc_trace+0x616/0x780 [ 483.864003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 483.869541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.875064] ? copy_mount_options+0x285/0x380 [ 483.879549] ksys_mount+0x12d/0x140 [ 483.883166] __x64_sys_mount+0xbe/0x150 [ 483.887133] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 483.892140] do_syscall_64+0x1b9/0x820 [ 483.896022] ? syscall_return_slowpath+0x5e0/0x5e0 [ 483.900949] ? syscall_return_slowpath+0x31d/0x5e0 [ 483.905873] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 483.911227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.916063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.921237] RIP: 0033:0x455a79 11:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x28, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x541d, &(0x7f0000000000)) 11:47:08 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40400, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000300)=0x1ff, 0x193) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") prctl$getname(0x10, &(0x7f00000001c0)=""/124) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x190) close(r0) exit_group(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r3, &(0x7f0000000040)='net/arp\x00') [ 483.924406] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.943746] RSP: 002b:00007f8f8b63ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 483.951444] RAX: ffffffffffffffda RBX: 00007f8f8b63f6d4 RCX: 0000000000455a79 [ 483.958700] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 483.965953] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 483.973207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 483.980462] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000048 11:47:09 executing program 6 (fault-call:4 fault-nth:73): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 484.092766] FAULT_INJECTION: forcing a failure. [ 484.092766] name failslab, interval 1, probability 0, space 0, times 0 [ 484.104131] CPU: 0 PID: 27550 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 484.111485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.120831] Call Trace: [ 484.123424] dump_stack+0x1c9/0x2b4 [ 484.127055] ? dump_stack_print_info.cold.2+0x52/0x52 [ 484.132253] ? free_unref_page+0x6e3/0x9a0 [ 484.136496] should_fail.cold.4+0xa/0x1a [ 484.140563] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 484.145664] ? graph_lock+0x170/0x170 [ 484.149464] ? graph_lock+0x170/0x170 [ 484.153274] ? lock_downgrade+0x8f0/0x8f0 [ 484.157430] ? find_held_lock+0x36/0x1c0 [ 484.161519] ? check_same_owner+0x340/0x340 [ 484.165841] ? do_raw_spin_unlock+0xa7/0x2f0 [ 484.170258] ? rcu_note_context_switch+0x730/0x730 [ 484.175203] __should_failslab+0x124/0x180 [ 484.179443] should_failslab+0x9/0x14 [ 484.183238] __kmalloc_track_caller+0x2c4/0x760 [ 484.187908] ? may_umount+0xb0/0xb0 [ 484.191532] ? do_mount+0x263c/0x30e0 [ 484.195335] kstrdup+0x39/0x70 [ 484.198528] do_mount+0x263c/0x30e0 [ 484.202163] ? copy_mount_string+0x40/0x40 [ 484.206402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 484.211165] ? retint_kernel+0x10/0x10 [ 484.215059] ? copy_mount_options+0x1f0/0x380 [ 484.219557] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 484.224408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.229941] ? copy_mount_options+0x285/0x380 [ 484.234437] ksys_mount+0x12d/0x140 [ 484.238071] __x64_sys_mount+0xbe/0x150 [ 484.242042] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 484.247060] do_syscall_64+0x1b9/0x820 [ 484.250946] ? syscall_return_slowpath+0x5e0/0x5e0 [ 484.255873] ? syscall_return_slowpath+0x31d/0x5e0 [ 484.260809] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 484.266178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 484.271030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.276216] RIP: 0033:0x455a79 11:47:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6, 0x101400) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000340)={{0x5, 0x752a}, 'port0\x00', 0x30, 0x1002, 0x1, 0x66, 0x5, 0x8, 0x1310, 0x0, 0x0, 0x4}) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000480)={r2, r2, 0x8, 0x4, &(0x7f0000000180)="123b3c5eceba7a765aaaa34f437001e2231f69fb2b244b4e12e749110d3a57eefa609c48c7a84c03cc39f08fca09519a64f6a47f0d7be7720d29f0e09dc064a9a9", 0x9, 0x401, 0x7fffffff, 0x2, 0x7, 0x1c47, 0x8, "8b2666a0ac13c5fdbb86b6530fca3e28560bbba90097f53f34baba943a8123fb30a8f0714c97e71c54a755a27548e02fcaadec2c7669dbbacc0fe50968f617edab5de4666d3d31"}) write$FUSE_OPEN(r0, &(0x7f0000000040)={0xffffffffffffff20, 0xfffffffffffffffe, 0x7, {0x0, 0x100000}}, 0x20) write$P9_RREAD(r2, &(0x7f0000000540)={0xdc, 0x75, 0x2, {0xd1, "248e208917e894ac6cf7a0cb83139e6395468384b536eff01f53d6522688f720d872fa6873cf6d596382da68df19c7de868d832da7403c33f175fb99e2b8022dbde3f8ff70d2abdae57e98b5e4d8a2d0f05655ea8ba11482576321e1b56cf5f1e67624726c94a1f9fe5286fe57dacf56940f6acd9fafd88c593bb8063be2a5147e84ca494c717c543c78b76b7ac3256f5e3bd3893b167c78d22b0d1972b8e89bc2d71479b84b0e9f72dcc9c8c64a0adde4c63a962803c055e5751298d7f623ebd6e9cfbf31604603b9f2d9433179ef897b"}}, 0xdc) 11:47:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5419, &(0x7f0000000000)) 11:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x16, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:09 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) [ 484.279396] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.298761] RSP: 002b:00007f8f8b63ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 484.306468] RAX: ffffffffffffffda RBX: 00007f8f8b63f6d4 RCX: 0000000000455a79 [ 484.313730] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 484.320992] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 484.328256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 484.335519] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000049 11:47:09 executing program 6 (fault-call:4 fault-nth:74): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 484.423972] FAULT_INJECTION: forcing a failure. [ 484.423972] name failslab, interval 1, probability 0, space 0, times 0 [ 484.435294] CPU: 1 PID: 27570 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 484.442662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.452017] Call Trace: [ 484.454621] dump_stack+0x1c9/0x2b4 [ 484.458273] ? dump_stack_print_info.cold.2+0x52/0x52 [ 484.463473] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 484.468342] should_fail.cold.4+0xa/0x1a [ 484.472418] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 484.477528] ? graph_lock+0x170/0x170 [ 484.481332] ? find_held_lock+0x36/0x1c0 [ 484.485412] ? find_held_lock+0x36/0x1c0 [ 484.489490] ? __lock_is_held+0xb5/0x140 [ 484.493570] ? check_same_owner+0x340/0x340 [ 484.497901] ? rcu_note_context_switch+0x730/0x730 [ 484.502845] __should_failslab+0x124/0x180 [ 484.507096] should_failslab+0x9/0x14 [ 484.510904] kmem_cache_alloc+0x2af/0x760 [ 484.515055] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 484.519645] ? kasan_check_write+0x14/0x20 [ 484.523892] ? do_raw_spin_lock+0xc1/0x200 [ 484.528138] __d_alloc+0xc8/0xd50 [ 484.531597] ? fuse_iget+0x1e5/0x840 [ 484.535319] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 484.540347] ? fuse_change_attributes+0x870/0x870 [ 484.545212] ? fuse_get_root_inode+0x129/0x1b0 [ 484.549802] ? fuse_iget+0x840/0x840 [ 484.553541] d_make_root+0x42/0x90 [ 484.557093] fuse_fill_super+0x128b/0x1ee0 [ 484.561347] ? fuse_get_root_inode+0x1b0/0x1b0 [ 484.565940] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 484.570976] ? cap_capable+0x1f9/0x260 [ 484.574887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.580430] ? security_capable+0x99/0xc0 [ 484.584588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.591172] ? ns_capable_common+0x13f/0x170 [ 484.595589] ? get_anon_bdev+0x300/0x300 [ 484.599654] ? sget+0x113/0x150 [ 484.602942] ? fuse_get_root_inode+0x1b0/0x1b0 [ 484.607527] mount_nodev+0x6b/0x110 [ 484.611156] fuse_mount+0x2c/0x40 [ 484.614614] mount_fs+0xae/0x328 [ 484.617986] vfs_kern_mount.part.34+0xdc/0x4e0 [ 484.622570] ? may_umount+0xb0/0xb0 [ 484.626199] ? _raw_read_unlock+0x22/0x30 [ 484.630345] ? __get_fs_type+0x97/0xc0 [ 484.634242] do_mount+0x581/0x30e0 [ 484.637792] ? copy_mount_string+0x40/0x40 [ 484.642038] ? copy_mount_options+0x5f/0x380 [ 484.646450] ? rcu_read_lock_sched_held+0x108/0x120 [ 484.651467] ? kmem_cache_alloc_trace+0x616/0x780 [ 484.656323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.661865] ? copy_mount_options+0x285/0x380 [ 484.666365] ksys_mount+0x12d/0x140 [ 484.669994] __x64_sys_mount+0xbe/0x150 [ 484.673968] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 484.678989] do_syscall_64+0x1b9/0x820 [ 484.682881] ? finish_task_switch+0x1d3/0x870 [ 484.687379] ? syscall_return_slowpath+0x5e0/0x5e0 [ 484.692309] ? syscall_return_slowpath+0x31d/0x5e0 [ 484.697247] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 484.702621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 484.707473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.712648] RIP: 0033:0x455a79 [ 484.715824] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.735172] RSP: 002b:00007f8f8b63ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 484.742870] RAX: ffffffffffffffda RBX: 00007f8f8b63f6d4 RCX: 0000000000455a79 [ 484.750129] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 484.757384] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 484.764641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 484.771909] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000004a 11:47:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5452, &(0x7f0000000000)) 11:47:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="83ed1a7e4b25654e28239e544e7f63223a71a939047ee103a002c0c78e8511604a1570d9dac2b6dc3864a8df2363120e5a3fcd7f7b889edac3caaadd607b6daf3646deb194400b04b31d8f033686d9b39d6a6e5d376ef9a2a181b78d3f2d56452bf15f053cdbce3bbad858", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = getpgrp(0xffffffffffffffff) getpgrp(r1) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:09 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x40042) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x9}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={r3, 0x10000, 0x10}, &(0x7f0000000240)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x32, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000180)=[0xee01, 0x0, 0xee01, 0xee00, 0xffffffffffffffff, 0xee01, 0x0, 0xee00, 0xffffffffffffffff, 0x0]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) r5 = getegid() r6 = geteuid() getgroups(0x8, &(0x7f0000000280)=[0x0, 0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) getresuid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)=0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)=0x0) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) r12 = syz_open_dev$ndb(&(0x7f0000000e00)='/dev/nbd#\x00', 0x0, 0x100) ioctl$BLKROGET(r12, 0x125e, &(0x7f0000000e40)) fstat(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), &(0x7f00000009c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB="d80300000000000007000000000000000200000000000000020000000000000001010000000000000400000000000000010000006c0100000000000000000000b6bc000000000000080000000000000001000000010000003d8d000000000000faffffffffffffff0400000001000000070000000600000004000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0400000004000000000000000100000000000000d90000000000000002000000200000006664000000000000050000000000000000000000000000000600000000000000b00e0000000000000600000000010000020000000000000000000100000000000100010000000000ffffffff000000000400000000000000b20e0000000000000500000008000000040000000400000000000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="000000000000000000000000040000000000000001000000000000000700000001000000757365725f696400060000000000000003000000000000000300000000000000cc070000000000003f0000000000000001000000000000000800000000000000000000000100000062fdffffffffffff0180000000000000010900000000000005000000070000000000010001000100b0060000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="6a00000001000000000000000400000000000000d80000000000000002000000200000006c6f000000000000030000000000000000000000000000000400000000000000c00000000000000001000100ffffffffa800000000000000040000000000000005000000000000000200000000000000040000000000000001010000000000002500000081000000ffffffff0300000000000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="c90000000900000000000000030000000000000006000000000000000a000000040000002f6465762f6675736500000000000000010000000000000000000000000000000100010000000000020000000000000001000000ff0700000300000000000000ff0f0000000000000000000000000000ae020000000000000700000000000000e6a10000000000000c000000000000006a0700000100000000100000", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="6f040000000000000000000004000000000000000500000000000000020000008100000066640000000000000100000000000000000000000000000000000000000000000500000000000000090000000800000006000000000000000900000000000000b90a0000000000009100000000000000660c0000000000000400000000000000010400000400000000000000ff070000f9ffffff", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="040000006700000000000000030000000000000069040000000000000800000003000000726f6f746d6f6465"], 0x3d8) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5413, &(0x7f0000000000)) 11:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x15, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:09 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00 \x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) eventfd2(0xffe000000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x78, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) r3 = gettid() fcntl$lock(r2, 0x5, &(0x7f0000000080)={0x2, 0x6, 0x1000, 0x100000001, r3}) 11:47:10 executing program 6 (fault-call:4 fault-nth:75): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5450, &(0x7f0000000000)) 11:47:10 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getpeername$inet6(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000000c0)={{0x1, 0x0, 0xd2, 0x1, 0xb94}}) 11:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x2a, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="661c4d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677233f0375f69643d9e0d8d9cb753523e4783142791f99cc9a241459e8f1c5987c2ed0499a0b0d61a7dd8fb39070041175565bf8a331ff11519f5aa0880c6cf04faad71c81d9797930c69d47337be6b88927c2c8bb071708768e7b12d7ddfa85f91ae91a7b2194220eac7f6ce3bf96854d4651564e5f9211df8b2955c45748feaa435b30b8990b1c59ff274dc3bbf8af598be264396803dc34de6b8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000540)="ec2c4fdaa80ceebc4528a742a8add6a4249a656627d377dbfb700b3979ca29119be4d89bba2ed8d8392e3896c93929e80ef509424323272539997392e6f5245dfebaabd39d9fcb59658a18c23f5ede3f4e354ecbee832c83229bac76bded99596a4f8fb3907f0ce1cdae2967f4ddd1c2a3577aed7a053299f46c2ae17a401a57b0d594b7ee7e895a204331afcdfae8678ecbfd175c78e63e7e58c41bf89ee9891b0e527289b422ff90f7efdcec890d4c052081fb2c1113a5fa0b3dc5731a376a0186b3ba6506127e1967416c06a3ffd56d6717bdb01d50d3685c769af32650a2a08196161bd684cd4d6e2b08d2f452", 0xef, 0x0, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000280)='./file0/file0\x00', 0x10000, 0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5402, &(0x7f0000000000)) 11:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x11, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:10 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/132, 0x84}, {&(0x7f00000002c0)=""/184, 0xb8}, {&(0x7f0000000380)=""/193, 0xc1}, {&(0x7f0000000480)=""/220, 0xdc}, {&(0x7f0000000580)=""/140, 0x8c}, {&(0x7f0000000640)=""/132, 0x84}], 0x6, &(0x7f0000000700)=""/248, 0xf8, 0xfffffffffffffffa}, 0x100) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000840)={@local={0xfe, 0x80, [], 0xaa}, r2}, 0x14) [ 485.500991] FAULT_INJECTION: forcing a failure. [ 485.500991] name failslab, interval 1, probability 0, space 0, times 0 [ 485.512611] CPU: 1 PID: 27622 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 485.519980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.529330] Call Trace: [ 485.531909] dump_stack+0x1c9/0x2b4 [ 485.535529] ? dump_stack_print_info.cold.2+0x52/0x52 [ 485.540706] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 485.545128] should_fail.cold.4+0xa/0x1a [ 485.549183] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 485.554275] ? __kernel_text_address+0xd/0x40 [ 485.558764] ? graph_lock+0x170/0x170 [ 485.562560] ? find_held_lock+0x36/0x1c0 [ 485.566617] ? __lock_is_held+0xb5/0x140 [ 485.570672] ? nl80211_dump_wiphy+0x200/0x770 [ 485.575166] ? check_same_owner+0x340/0x340 [ 485.579477] ? rcu_note_context_switch+0x730/0x730 [ 485.584398] __should_failslab+0x124/0x180 [ 485.588627] should_failslab+0x9/0x14 [ 485.592418] kmem_cache_alloc_trace+0x2cb/0x780 [ 485.597075] ? __legitimize_mnt+0x86/0x130 [ 485.601308] get_mountpoint+0x162/0x410 [ 485.605281] ? namespace_unlock+0x210/0x210 [ 485.609590] ? down_read+0x1d0/0x1d0 [ 485.613311] lock_mount+0xfa/0x2e0 [ 485.616845] do_add_mount+0x27/0x370 [ 485.620554] do_mount+0x193f/0x30e0 [ 485.624177] ? copy_mount_string+0x40/0x40 [ 485.628412] ? copy_mount_options+0x5f/0x380 [ 485.632812] ? rcu_read_lock_sched_held+0x108/0x120 [ 485.637817] ? kmem_cache_alloc_trace+0x616/0x780 [ 485.642659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 485.648188] ? _copy_from_user+0xdf/0x150 [ 485.652327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.657852] ? copy_mount_options+0x285/0x380 [ 485.662339] ksys_mount+0x12d/0x140 [ 485.665956] __x64_sys_mount+0xbe/0x150 [ 485.669920] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 485.674929] do_syscall_64+0x1b9/0x820 [ 485.678802] ? syscall_slow_exit_work+0x500/0x500 [ 485.683636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 485.688555] ? syscall_return_slowpath+0x31d/0x5e0 [ 485.693489] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 485.698844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 485.703683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.708866] RIP: 0033:0x455a79 [ 485.712040] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.731376] RSP: 002b:00007f8f8b63ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 485.739075] RAX: ffffffffffffffda RBX: 00007f8f8b63f6d4 RCX: 0000000000455a79 [ 485.746329] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 485.753585] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 485.760839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 485.768094] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000004b 11:47:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x60) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000180)={@remote, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000280)={@local={0xfe, 0x80, [], 0xaa}, r2}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f00000002c0)) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:11 executing program 6 (fault-call:4 fault-nth:76): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x3, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5437, &(0x7f0000000000)) 11:47:11 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) close(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x10000, 0x0) r3 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000002c0)={{0x1, 0x0, 0x9, 0x9, 'syz1\x00', 0x3ff}, 0x1, 0x4, 0x0, r3, 0x1, 0x8, 'syz1\x00', &(0x7f00000000c0)=['wlan0\'wlan1,ppp0md5sum](md5sum]cgroupselinux]proc\x00'], 0x32, [], [0x7, 0x9, 0xe4, 0x81]}) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x2002, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r4) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r1) 11:47:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x3, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x8) [ 486.222579] FAULT_INJECTION: forcing a failure. [ 486.222579] name failslab, interval 1, probability 0, space 0, times 0 [ 486.233910] CPU: 0 PID: 27664 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 486.244043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.253386] Call Trace: [ 486.255980] dump_stack+0x1c9/0x2b4 [ 486.259612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 486.264802] ? kasan_check_write+0x14/0x20 [ 486.269034] ? __init_rwsem+0x1cc/0x2a0 [ 486.273016] should_fail.cold.4+0xa/0x1a [ 486.277080] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 486.282190] ? graph_lock+0x170/0x170 [ 486.285993] ? find_held_lock+0x36/0x1c0 [ 486.290063] ? find_held_lock+0x36/0x1c0 [ 486.294139] ? __lock_is_held+0xb5/0x140 [ 486.298234] ? check_same_owner+0x340/0x340 [ 486.302577] ? rcu_note_context_switch+0x730/0x730 [ 486.307527] __should_failslab+0x124/0x180 [ 486.311774] should_failslab+0x9/0x14 [ 486.315589] kmem_cache_alloc+0x2af/0x760 [ 486.319747] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 486.324345] ? kasan_check_write+0x14/0x20 [ 486.328582] ? do_raw_spin_lock+0xc1/0x200 [ 486.333780] __d_alloc+0xc8/0xd50 [ 486.337240] ? fuse_iget+0x1e5/0x840 [ 486.340962] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 486.345984] ? fuse_change_attributes+0x870/0x870 [ 486.350830] ? _raw_spin_unlock+0x22/0x30 [ 486.354996] ? fuse_get_root_inode+0x129/0x1b0 [ 486.359583] ? fuse_iget+0x840/0x840 [ 486.363316] d_make_root+0x42/0x90 [ 486.366863] fuse_fill_super+0x128b/0x1ee0 [ 486.371112] ? fuse_get_root_inode+0x1b0/0x1b0 [ 486.375700] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 486.380728] ? cap_capable+0x1f9/0x260 [ 486.384633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.390172] ? security_capable+0x99/0xc0 [ 486.394326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.399865] ? ns_capable_common+0x13f/0x170 [ 486.404275] ? get_anon_bdev+0x300/0x300 [ 486.408359] ? sget+0x113/0x150 [ 486.411643] ? fuse_get_root_inode+0x1b0/0x1b0 [ 486.416234] mount_nodev+0x6b/0x110 [ 486.419960] fuse_mount+0x2c/0x40 [ 486.423418] mount_fs+0xae/0x328 [ 486.426795] vfs_kern_mount.part.34+0xdc/0x4e0 [ 486.431383] ? may_umount+0xb0/0xb0 [ 486.435013] ? _raw_read_unlock+0x22/0x30 [ 486.439158] ? __get_fs_type+0x97/0xc0 [ 486.443051] do_mount+0x581/0x30e0 [ 486.446589] ? do_raw_spin_unlock+0xa7/0x2f0 [ 486.451001] ? copy_mount_string+0x40/0x40 [ 486.455243] ? copy_mount_options+0x5f/0x380 [ 486.459650] ? rcu_read_lock_sched_held+0x108/0x120 [ 486.464666] ? kmem_cache_alloc_trace+0x616/0x780 [ 486.469604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 486.475143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.480678] ? copy_mount_options+0x285/0x380 [ 486.485181] ksys_mount+0x12d/0x140 [ 486.488818] __x64_sys_mount+0xbe/0x150 [ 486.492792] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 486.497807] do_syscall_64+0x1b9/0x820 [ 486.501692] ? finish_task_switch+0x1d3/0x870 [ 486.506196] ? syscall_return_slowpath+0x5e0/0x5e0 [ 486.511135] ? syscall_return_slowpath+0x31d/0x5e0 [ 486.516074] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 486.521443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.526295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.531483] RIP: 0033:0x455a79 [ 486.534663] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.554027] RSP: 002b:00007f8f8b63ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 486.561739] RAX: ffffffffffffffda RBX: 00007f8f8b63f6d4 RCX: 0000000000455a79 [ 486.569002] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 486.576270] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 486.583533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 486.590798] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000004c 11:47:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x2a400, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@blksize={'blksize', 0x3d, 0x200}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}, {@max_read={'max_read', 0x3d, 0x350}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}]}}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f00000006c0)={{0x2, 0x4e20, @broadcast=0xffffffff}, {0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10, {0x2, 0x4e22, @broadcast=0xffffffff}, 'bond_slave_0\x00'}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20) read$FUSE(r0, &(0x7f0000002000), 0xfffffffffffffd12) open$dir(&(0x7f00000000c0)='./file0\x00', 0x20, 0x800000003) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:11 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5416, &(0x7f0000000000)) 11:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0xf, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xc2b1, 0xd4bf6df39906a5e4) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:11 executing program 6 (fault-call:4 fault-nth:77): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:11 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000720e0000feffffff00000001000080000000000000000000000000000900000000000000"]) close(r0) write$binfmt_elf32(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x10001, 0x400, 0x9, 0x8, 0xfffffffffffff000, 0x3, 0x3f, 0x80, 0x80, 0x38, 0x100, 0x199, 0x400, 0x20, 0x1, 0x4, 0x7fffffff, 0x6}, [{0x7, 0xffffffffffff70c8, 0x7fff, 0x80, 0x5, 0x9, 0x8, 0x2}, {0x3, 0x9, 0x224, 0x7ff, 0x0, 0x2, 0x7, 0x3}], "d86d730c346270111044290b30acaf7a68172967f70bb9ecfae972583a1711a14971b2288281f5807ab6c75e007c173e84246e54a110e24e08f0eac3eb69b547d9a6c362054547fea628855b59998ca83827121520fd2f9b0bbdac2f42ab90f05c9f23dbfb2ae2e0dffea9625deef6d6efd3ed1f92c5d8744513784c288e9921f2bd815fab792e4600c1", [[], [], [], [], [], []]}, 0x702) 11:47:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5441, &(0x7f0000000000)) 11:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x2, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000003000), 0x1000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x228000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000008c0)=0x9, 0x4) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x14d, 0x10000000, 0x3}, 0x20) 11:47:12 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5412, &(0x7f0000000000)) 11:47:12 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x111802) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000040)={0x6, 0xb0b}) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x14, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:12 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) socket$inet_smc(0x2b, 0x1, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x540d, &(0x7f0000000000)) 11:47:12 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6c00000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x19, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESDEC=r0, @ANYRES16, @ANYPTR64, @ANYRESOCT=r0, @ANYBLOB="f86ce2349f006915a78ea2fd4b2a8621e9c739c36eda3e84b85b5c3c69cb8d33a783376673f1d706fa930b445fe16174", @ANYBLOB="b13047dbc8bb0e865099eee1ea0dc5479ff3a3254cb1de1388b5dd7bcf9262e50cb7f67f29102d123a337a7407adc92b1c4c1f711482ac06f9cb15c8a2e685148b01fbdb68cf61f522caefd62abdd0e555a1b7428fc40a1728583e779d1207f0e4c163d9ff5e494b24f3b8204448d22aeefc35337644fc7fa14f6e91b24fe74424f356eaf37b6998dca6ef13743e29fef6e9f4b06888388f89dfd834e0a59a98c8da7dbd424d", @ANYRES32=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRES32=r0], @ANYBLOB="1f2307d846a9eb16ccf17094d483024d2e00fe247bf1bfc20b7d223d6c5b8286e9225d25dfb5cb534f1b96040835ea448651217556403932109fa5ca8974143bf080eb63605d3a43481fba0967d48414b2ff4e406a50b86f031f02643654d30bde5bba45fa4e121060c5599eaa43257647bd18944f979e734409f02ac9ffe45d8bb349d972cef9582b2a61d9e4d4c1757ce0426a9201fb08c8bc2a4e38cca8a5bc31e974e06326bfd9ac23831230656de03acc40e16de9cce61278ce09973bae4395a6673d452d35461c0dd6fc78f8906e44e24eaa4251acf4f251d8b1dfc9ff1f547f58a9225a2ed191078c02d0e76e6fcd58941e7019dab712e537", @ANYRESOCT=r0, @ANYRES32, @ANYRES16=r0, @ANYRES32=r0, @ANYRES32=r0], @ANYRESDEC=0x0, @ANYBLOB=',gr[id=', @ANYRESDEC=0x0, @ANYBLOB="2c00e28dc9445be1dc025115f40a39f1631fa2ed47f8fc5a0a571fd8a38633fb11cd35b4a872f574bdf7f36a68cffffaeebe635f6743ad904534e33130daa713dc9a48afdfe5ee80603dca7e42ee37687a0f2a8a644cde336e45f5db173ac4afa0392dbf83ec7d9bdbba9442914a00068c5c1c1cfa7bb517e56776ac306282d008bc85bd06fd0acffa279b466cbd1f9d16951f9f"]) r1 = socket(0x1b, 0x800, 0x5) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xfffffffffffffffc}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e20, 0x401, @empty, 0x9d9}}, 0x7346ec4f, 0x7, 0x3f, 0x4, 0x2d}, &(0x7f00000001c0)=0x98) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000400)=0xb) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) shutdown(r1, 0x1) 11:47:12 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542d, &(0x7f0000000000)) 11:47:12 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffffffe4, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:12 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x2) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1400000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000004000), 0xffffffffffffffba) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x2d, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x541a, &(0x7f0000000000)) 11:47:13 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xc0ed0000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000003000), 0xfffffffffffffe77) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x8000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x8801, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000280)={0x5, 0x32, 0x1, r2}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x478, 0x0, 0x118, 0x250, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000080), {[{{@uncond, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x800}}}, {{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00', 0x6}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @rand_addr=0x8, @loopback=0x7f000001, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='.\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x4004, &(0x7f0000000ac0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d, 0x1000}, 0x2c}, {@max_read={'max_read', 0x3d, 0xe00}, 0x2c}, {@default_permissions='default_permissions', 0x2c}]}}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) close(0xffffffffffffffff) 11:47:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cc5b56f75705f69f611", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x43d430a4a512f1a4) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'\nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5451, &(0x7f0000000000)) 11:47:13 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d7e, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x200, &(0x7f0000000080)="025cc83dea0f5f37402070") close(r1) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400) write$FUSE_INIT(r0, &(0x7f00000001c0)={0x50, 0x0, 0x4, {0x7, 0x1b, 0x100000000000000, 0x100, 0x4, 0x4, 0x2, 0x4}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x2, 0x6, 0x7}}, 0x30) 11:47:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5415, &(0x7f0000000000)) 11:47:14 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xf0ffffff00000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x117, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {r2, 0x87, "cb377e", "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"}}, 0x110) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) sync_file_range(r3, 0x6, 0x8, 0x2) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) [ 489.022669] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000003000), 0xffffffffffffff5b) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 489.095663] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000400)='fuse\x00', 0x3) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000440)={0x0, 0x9}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000540)={r1, 0x68, &(0x7f00000004c0)=[@in={0x2, 0x4e22}, @in={0x2, 0x4e21}, @in6={0xa, 0x4e23, 0x80000000, @mcast2={0xff, 0x2, [], 0x1}, 0xfffe0000000}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0xe}, 0xee58}]}, &(0x7f0000000580)=0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e269467b9c23765d71765aca9", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r2, &(0x7f0000001000), 0x1000) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000280)={[0x4000, 0x10000, 0x117002, 0x2000], 0x7, 0x40, 0xe7}) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x14802, 0x0) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000180)=0x1) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f00000003c0)) 11:47:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5409, &(0x7f0000000000)) 11:47:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb2, 0x4, 0x7}, 0x2c) bpf$MAP_CREATE(0xf, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x1ffe0000000, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:14 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x758d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x6, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x60f, 0x220000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000001c0)={0x8, 0x200, 0x20, 0x9, 0x0}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={r1, 0x9, 0x9, 0xfa, 0x4, 0x1ff}, 0x14) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x40045436, &(0x7f0000000000)) 11:47:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x3, @loopback={0x0, 0x1}}}, 0x8, 0x6, 0x7, 0x3, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e23, @broadcast=0xffffffff}}, 0xde, 0x7}, 0x90) close(r0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000380)={r3, 0x9, 0xed, "66eacfd0706e5570ee07d584af6de34166c2ff2576a7c43e89ea1a51198864153f69c4656843c79127cdb77ca6673bfa15c41e41128ec0267f9b025f29652bd5ffb644af8728ad27caf7d3153c74fe668d4e94b00eb7badf19d030cd0376cf2afd10882d75761e05e99e6c6f4aae7d2257c448402620867661a9248a6195c278d07b56a0697aacf9b918adc0e332ea39eeaf03d203a833b6d9de1471b3d24ddf28e7f989b9b2d36c16c09b7b7bfe0062fc31cadfb5649bb3fe7fe5cf2d21386f18ebbd80f0a93ee45d13b620146a6849902ee587708514ea8a1e1e49dd31793ce173e13caab37b8ce19c5ba9a9"}, 0xf5) close(r1) 11:47:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4800000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'%at\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1400) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00a53a38a6d95f5b1eb7"]) r1 = socket$inet6(0xa, 0x1000000000002, 0xffffffffffff8000) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x808d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 490.134922] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 490.135550] QAT: Invalid ioctl 11:47:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0xc0045878, &(0x7f0000000000)) 11:47:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x400200, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 490.186131] QAT: Invalid ioctl 11:47:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xc000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 490.225755] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 490.253600] QAT: Invalid ioctl 11:47:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5424, &(0x7f0000000000)) 11:47:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'n\nt\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:15 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000300)={0x1, 0x1, {0x3a, 0x2e, 0x2, 0x13, 0x4, 0xffffffff, 0x0, 0x1b, 0xffffffffffffffff}}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = memfd_create(&(0x7f0000000000)='/dev/fuse\x00', 0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000400)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, 0x1000, 0x1}) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02062bbd7000fedbdf250a00000034000200080003000400000008000700ff07000008000500370900000800050000060000080005000004000008000400080000000800040002000000"], 0x50}, 0x1, 0x0, 0x0, 0x20008000}, 0x10) r4 = request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000003c0)='!-)[:^posix_acl_access', 0xfffffffffffffffd) keyctl$revoke(0x3, r4) 11:47:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c9e461a9006cd63f2af20d733cf6b95f37f225e6e6acf211077f2d10dff67b72475a781fbf36da9f70b96f192bd32e7dc65436aba4ffb4acaa697b96dc395573e3a11c8c0106fa0a4dc47fe1f48929f5dc004abbf65ad980cb75ac7c46c10d262645cbd5d399fe2d264a9a215590a597d2b65782b7355d7746023292b617012ffb85a728368415ec2912a32f5c99372cb50a1b7c8cfa4da6437ee633d5e1d0e14f0282c4e0ae02ca431037bf54c6257c77e68a15af52b82c814327feaf065e97d00000002000000"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'erspan0\x00', 0x100}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x40000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d79, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5404, &(0x7f0000000000)) [ 490.412283] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000008, 0x200000000001) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x20200) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x3, 0x9, 0x1, 0x5, 0x1000}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x1fffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x540a, &(0x7f0000000000)) [ 490.510259] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='"\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x400, 0x8b) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000540)="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") r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x80000, 0x404000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) fcntl$setflags(r0, 0x2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x80) read$FUSE(r0, &(0x7f0000001000), 0xffffffffffffff3f) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000640)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)='fuse\x00', 0x84020, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}, {@allow_other='allow_other', 0x2c}, {@max_read={'max_read', 0x3d, 0x9}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@max_read={'max_read', 0x3d, 0x6}, 0x2c}, {@max_read={'max_read', 0x3d, 0x9}, 0x2c}, {@default_permissions='default_permissions', 0x2c}]}}) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) read$FUSE(r0, &(0x7f0000001000), 0x1000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000003c0)=0x7, 0x4) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) r7 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x40, 0x400000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000002c0)) ioctl$KDSKBMODE(r7, 0x4b45, &(0x7f0000000180)=0x762) 11:47:16 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'n%t\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 491.256158] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 491.300419] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d33fcaf8445ad3fbbdf6b687d30d2cda7cee3371791c7c2c342344296ba6aabf44d171e99612bcd157b464d97ed7e8d040c9830f204cb20a51ebf6571a7b64b5207bc392fcafa9d4ee415444d3764dfbc9da318879cffd862f059f5413abeaab4900588df795c22719210212ac18da4b69015644477efa4e9a279cacec79510d21e93eee24cbec5d86b5ea0504d51a8099732fcfc87d97a79274cd886db3aecb65f1adbbb4be0ae8aa6ebf6fa8db6c30cd0bdf00619331414c8fa4f1c84f3d0252372542f89ed9a6a36027967b9b919ed62f9a74bf7ebc5b94ef3070bc0fae99a0502", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5429, &(0x7f0000000000)) 11:47:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) socket$inet6(0xa, 0x1000000000002, 0x0) close(r1) 11:47:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64453d3030303030303030045b30303030303030303430302d4b302c757365724d6964", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'ngt\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643d00610c80454b932bfab86ea5e6cb7d1cd966989d5f61fcc1dd8b691d3806eb7ca9c5d8bc099ee980776f1ae65fceb0278086415cddc4fa61cb66011a9a609fd43f427d81764c43ac6848c3d0bffc7266cf5d5cf0c971489f823b1023b9c591bed27ca4b68bbc50ceba", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r1, r2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) getresuid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)=0x0) r4 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r3, r4) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:16 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7a8d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x80045438, &(0x7f0000000000)) 11:47:16 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x300, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$void(r0, 0xc0045c76) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) [ 491.459325] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:16 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x4081) mkdirat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2cef6f6f746d6f64653d303030303008003030030000002c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000480)={0x104, 0x0, 0x6, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x8) read$FUSE(r1, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 491.555970] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) sendmsg$rds(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x2, 0x4e21, @broadcast=0xffffffff}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000540)=""/249, 0xf9}], 0x1, &(0x7f00000001c0)=[@zcopy_cookie={0x18, 0x114, 0xc}], 0x18, 0x4008000}, 0x20000001) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000180)=0xbcc) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x540e, &(0x7f0000000000)) 11:47:17 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'na\n\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000800)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x400) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0xadd1, 0x10}, 0xc) ioctl(r1, 0x8914, &(0x7f0000000000)="025cc83d6d345f8f762070") write$binfmt_aout(r0, &(0x7f0000000200)={{0x107, 0x0, 0x7, 0x36c, 0x20f, 0xdf1, 0xa2}, "91c3f727ba5a87fae225098900a871baafba58e258e872572c34632794ea894d8879110ddae910e0d468c5ad16a6a60dbf75009e1646ef573f17a99ff099bac60ce00d5cb78397626cead06cc316f81e4ebdd2ae29a42d51912abbd7e0592a2076d164d6a039eb2375d75f3c89792e995d4ff36a048e755a6ef2b6fc68b0a1b1a07d300fe5bff7ddfff35daf0f642f7b2c206693b08eab623af85ad3dffc0ae617572ee7496ff125de120313fcbd7710ee08d613eb0b4ff22587613ae2c764731fb96abfb9bf22cdd1cfe7652e5c12253e58cdda3db3f60b6f365f9e61008fbfe98c993487ca8e254e9ed238cbb3fb", [[], [], []]}, 0x40f) close(r0) 11:47:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d000000000000015e3030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x1, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000003000), 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x101000, 0x0) fstatfs(r1, &(0x7f0000000540)=""/220) r3 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x8001, 0x40000) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000380)={0x2, [0xb58, 0x100]}, 0x8) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000640)=""/193) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) getsockopt$inet6_tcp_buf(r1, 0x6, 0x3d, &(0x7f0000000180)=""/93, &(0x7f0000000240)=0x5d) 11:47:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0xc020660b, &(0x7f0000000000)) 11:47:17 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x71090000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643d6a03384f6278820561c02cc9add4c2e86a661255a80dd8d1028b7b193da88c48d582895edb93c9439afd64fdd35a1c11c25e16df18ba2b11154d08359cb8b745af21270958fed601806082094bc6192312a7c57cc65b71a9f274acb2e3af8614bfaff65db57a225f367745694551e67640d1bdd19170ecae3851515745fe5755baefc3212c7f99902c40e510780d337b12f73288", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x862) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 492.178846] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = dup3(r1, r1, 0x80000) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x6, 0x2) close(r0) [ 492.244490] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'na%\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:17 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d77, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5406, &(0x7f0000000000)) 11:47:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0xffffffffffffff6b) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000240)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='md5sumproc.\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000001c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 492.374079] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 492.421104] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x81, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x81) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000180)=""/65, 0x41) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030344430303003757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x704d, &(0x7f0000000080)=0x0) io_getevents(r1, 0xffffffffffff8001, 0x1, &(0x7f0000000180)=[{}], 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x2, r2}) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40000) socket$kcm(0x29, 0x7, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0)=0x9, 0x4) pkey_alloc(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000001c0)={r3, r3}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vlan0\x00', 0x2}) 11:47:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0xc0045878, &(0x7f0000000000)) 11:47:18 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7f8d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:18 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x798d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 493.319840] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5408, &(0x7f0000000000)) 11:47:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sched\x00') getsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) close(r0) 11:47:18 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7f8d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 493.391904] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5407, &(0x7f0000000000)) 11:47:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) write$binfmt_script(r1, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '/dev/fuse\x00'}], 0xa, "edfc87b06c76d35870dc2d0badb7a0d407e1a8c3161a9b170a06035cbd485b7bc7da0332287e8fc34303eec417d5f70a4c0e0000a41ba5f0d8fb589edf07242bc545d1a4e5e1f5220cd87e15e81b9d7974ab42fa2659ef396757597e517806cd18405e9985ba428195d0bfd9ef993d0064f019e97895c571bbe1991678483f6c787299fe286d0ee3075e99b3a56efa66a294191332bb7e1ffdd1cfd63cc28daa50e26c0139073fef10"}, 0xbf) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x2, 0x3f, 0x2]}, 0xa) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) 11:47:18 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffff1f00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0xffffffffffffff80, 0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x9}, 0x8) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 493.566788] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 493.632499] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1224) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5460, &(0x7f0000000000)) 11:47:19 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x204c00) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{0x0, 0x4000, 0xa, 0x8, 0x7, 0x100, 0x240000000000, 0x5a5, 0x1000, 0x100, 0x400, 0x1}, {0x2, 0x2000, 0x0, 0x4, 0x8, 0x10001, 0x80000001, 0x80000001, 0xc377, 0x80000000, 0x6, 0xffff}, {0x0, 0x1, 0x7, 0xdab, 0x4f6, 0x10, 0xcc3f, 0x101, 0x1, 0x0, 0x0, 0x5}, {0xd000, 0x2000, 0xf, 0x2, 0x7fffffff, 0x0, 0x4, 0x7ff, 0x1ff, 0x6, 0x0, 0x8}, {0xf000, 0x4, 0x0, 0x7, 0x6, 0x7, 0x3dee, 0x400000, 0x1, 0x5, 0x20, 0xfffffffffffffffd}, {0x0, 0x10f001, 0xf, 0x1, 0x3, 0xfffffffffffff801, 0xff, 0x5, 0x0, 0x7ff, 0xc248, 0x2}, {0x1, 0x2, 0xb, 0x1ff, 0x155, 0x1, 0xff, 0x5, 0x100, 0x8000, 0x0, 0x3}, {0x100000, 0x6000, 0x0, 0x7, 0x7, 0xab9e, 0x2, 0x8, 0x100000001, 0x0, 0xec2, 0x4}, {0x2000, 0x2000}, {0x0, 0x4}, 0x10, 0x0, 0xd000, 0x10000, 0x9, 0x2000, 0xf005, [0x7f, 0x1, 0x6ea, 0x721]}) close(r1) 11:47:19 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7c8d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000180)=0xc) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x8, {0x5, 0x0, 0x1ff, 0x3, 0xabf, 0x6, {0x2, 0x7f, 0x87, 0xfffffffffffffffa, 0x101, 0xd00, 0x9, 0x0, 0xc980, 0x0, 0x2, r1, r2, 0x4, 0x401}}}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61747fffffff00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={'\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) getsockopt$inet6_int(r1, 0x29, 0x48, &(0x7f0000000000), &(0x7f0000000040)=0x4) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r3, 0x3f}, 0x8) 11:47:19 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d7c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5423, &(0x7f0000000000)) [ 494.337349] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:19 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4000000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x8000000000000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/snmp6\x00') getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f00000000c0)=0x60) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000240)=ANY=[@ANYBLOB="050000ff080000009c09000007000000"]) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc0000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000040)) 11:47:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5403, &(0x7f0000000000)) [ 494.385274] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000200", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xcc, 0x400) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") close(r0) [ 494.531099] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x88200, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffff9c, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x0, {0xa, 0x4e23, 0x401, @loopback={0x0, 0x1}, 0x7}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000002c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r3}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000340)=0x3, 0x4) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 494.581128] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000280)=""/23, 0x17}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000000540)=""/216, 0xd8}, {&(0x7f0000000340)=""/19, 0x13}, {&(0x7f0000000380)=""/38, 0x26}], 0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) r2 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080)={0xadcd, 0x6, 0x8, 0x4, 0x40000, 0x4, 0x0, 0x5, 0x8b2e, 0x5, 0xff}, 0xb) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:20 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x1f000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5410, &(0x7f0000000000)) 11:47:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000400000002, 0x3) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socketpair(0x9, 0x7, 0xfff, &(0x7f0000000080)={0xffffffffffffffff}) getpeername(r1, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f0000000280)=0x80) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:20 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d74, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 495.505839] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x80045440, &(0x7f0000000000)) [ 495.550640] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x80045430, &(0x7f0000000000)) 11:47:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x80, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x100000000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x10000003, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r1) 11:47:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:20 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xc00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030300200000030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000002c0)={0x5, {{0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffffffa}}, 0x1, 0x4, [{{0xa, 0x4e20, 0x100000001, @dev={0xfe, 0x80, [], 0x16}, 0x1}}, {{0xa, 0x4e24, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}, {{0xa, 0x4e23, 0x800, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}, {{0xa, 0x4e20, 0x10000, @local={0xfe, 0x80, [], 0xaa}, 0x33a7}}]}, 0x290) r2 = fcntl$getown(r0, 0x9) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) readlinkat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) ptrace$peekuser(0x3, r2, 0x9) 11:47:20 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x778d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 495.708352] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 495.769889] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6664b4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000240)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@rand_addr=0x7, 0x4e20, 0x2b, 0x4e24, 0xc3fa, 0x2, 0x0, 0x20, 0x3c, r3, r4}, {0x0, 0x10001, 0x0, 0x13c2, 0x7, 0x401, 0x23e5, 0x7fff}, {0x1, 0x1, 0x6, 0x6}, 0x2, 0x8, 0x0, 0x1, 0x1, 0x3}, {{@in=@loopback=0x7f000001, 0x4d5, 0x33}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x19}, 0x3500, 0x7, 0x1, 0x3ff, 0x8, 0x9, 0x4}}, 0xe8) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000080)={0x40, 0xfffffe9e}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000180)={0x1d}, 0x10) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000580)={&(0x7f0000000400)={0x1d}, 0x10, &(0x7f0000000540)={&(0x7f00000004c0)={0x5, 0x0, 0x0, {}, {}, {0x0, 0x0, 0x1105}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "71075b8a74c927af"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x1d}, 0x10, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="04e16c3937e0c4514b4e050049bf2ee156f55058c22ea3ff84aa650512293b690f", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x48}, 0x1}, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0xc0189436, &(0x7f0000000000)) 11:47:21 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x768d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth1_to_team\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="ffff00000000800000000000000000000000000002"]}) setsockopt$inet_int(r2, 0x0, 0x40, &(0x7f0000000080), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x7e4116b1, 0x4, 0x7, 0x40, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)={r3, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0xa040, 0x0) r3 = open(&(0x7f0000000180)='./file1\x00', 0x60001, 0x4) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f00000001c0)={0x0, r3}) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x68, 0x0, 0x4}, 0xfffffffffffffefb) 11:47:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000200", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="f0008b1de714efd39c92041224a7f5ba7885f6f8068c63d8dbedaf13ef93eab715c40688bc86a174b6f6f07157aa671b7402a74e61fe4597a5a3900f58467dd38e733a719a79b3e591bf36064868a71dd4043249be7c63557b53770e1612edfd2326561bf471d4e5514164129dbb3f1cbe2232862b321e26510204"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x48020}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) pwrite64(r0, &(0x7f0000000340)="ba0fbc6316d6c753e939bad84127ab8d63a679b797a42968577e67b1422e6054c235a4f2fce8781ee7cb7ec2981b4780c79c0cd20d8411de7dbe8f73dd5a406c3ea1a6e26d94cdd167b94de9ee32c401ce620dfaa49a56426c1a0b545c640e8b71d9e09a55f9ba3651a7569fdf30840f7671a139b35d75149f6f6ddc05a052229f45d45dcb1512b6e59c9ff62abb604a8cdf87c66690", 0x96, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:21 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xf6ffffff00000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 496.734457] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x541b, &(0x7f0000000000)) 11:47:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000200)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) r2 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x0, 0xfff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000000c0)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000002c0)={0x4b, 0x6, 0x0, {0x0, 0x2, 0x22, 0x0, '/proc/sys/net/ipv4/vs/am_droprate\x00'}}, 0x4b) close(r1) 11:47:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x8042, 0x78) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 496.801657] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:21 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7109000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5420, &(0x7f0000000000)) 11:47:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x400, 0x1}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r1) [ 496.922932] QAT: Invalid ioctl [ 496.939784] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 496.951611] QAT: Invalid ioctl [ 496.992252] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 497.549996] QAT: Invalid ioctl [ 497.685636] QAT: Invalid ioctl 11:47:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f748546a6b49ae4266530303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fc4f295dd880e0d8568fc1"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:22 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6800, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x10000000}) 11:47:22 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400080, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0x2}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000600)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ff6000/0x8000)=nil, 0x8000, &(0x7f0000000640)=""/133) connect$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10) r2 = socket$inet6(0xa, 0x1000000000002, 0x1) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000005c0)=0x40, 0x4) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=[&(0x7f00000001c0)=':x^eth0,em0[\x00', &(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)="87776c616e312b00", &(0x7f00000002c0)='user\\mime_type\x00', &(0x7f0000000300)='/dev/fuse\x00', &(0x7f0000000340)='keyring\x00', &(0x7f0000000380)='/dev/fuse\x00'], &(0x7f0000000580)=[&(0x7f0000000400)='{$/proc.ppp0vboxnet1md5sumsystem{cpuset\x00', &(0x7f0000000440)='/dev/fuse\x00', &(0x7f0000000480)='/dev/fuse\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='/dev/zero\x00', &(0x7f0000000540)='\x00'], 0x1800) syncfs(r0) close(r1) 11:47:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00 \x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = getpgrp(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) tgkill(r2, r3, 0x27) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) mknodat(r4, &(0x7f0000000180)='./file1\x00', 0x40, 0x8) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fa=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d8364653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x70) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xfffffffe, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x10}) 11:47:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 497.994336] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x758d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:23 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setsig(r0, 0xa, 0x2b) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$FICLONE(r0, 0x40049409, r0) close(r1) 11:47:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x10000000000000}) [ 498.097303] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x8cffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x2280) getsockopt(r1, 0xf25c, 0x9568, &(0x7f0000000540)=""/194, &(0x7f0000000180)=0xc2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0xfdfdffff00000000}) 11:47:23 executing program 4: r0 = socket$inet(0x2, 0x200000000a, 0x9) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, r0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) delete_module(&(0x7f0000000080)='/dev/fuse\x00', 0x800) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x400000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) mkdirat$cgroup(r3, &(0x7f0000000240)='syz4\x00', 0x1ff) fsetxattr(r3, &(0x7f00000000c0)=@random={'security.', '\x00'}, &(0x7f00000001c0)='.%vmnet1-%vboxnet1user\x00', 0x17, 0x1) close(r1) [ 498.220287] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 498.256843] syz-executor4 uses obsolete (PF_INET,SOCK_PACKET) 11:47:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffffff7f00000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x100000}) [ 498.281125] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66a779", @ANYRESHEX=r0, @ANYBLOB="1e796c8de98a49b4653d303030303030303030cc17303030757365725f69", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x55f, 0x2800) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174008800", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4800, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x8, 0x3ff, 0xfffffffffffffff8, 0x1, 0x0, 0x2, 0x88020, 0x2, 0x7, 0x0, 0x81, 0x7, 0x698d7822, 0xfffffffffffffff8, 0x3ff, 0x1a12, 0x2, 0x8, 0x4, 0x1, 0x9, 0x0, 0x0, 0x5, 0x9, 0x8, 0x5, 0x80000001, 0x9, 0x31e6, 0x2, 0x6, 0x2, 0xf689, 0x3, 0xd9, 0x0, 0x1, 0x0, @perf_config_ext={0x8000, 0x7}, 0xc32, 0xc1f2, 0xed, 0x3, 0x9, 0x8, 0x1}, r3, 0x0, r1, 0x1425b98be8262bbc) 11:47:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000180)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0xfdfdffff}) 11:47:24 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") 11:47:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x971, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0xfffffdfd}) [ 499.153159] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d73861f6b5c24b9bf327ce45d4b02e6af52c35d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_STATFS(r0, &(0x7f0000000340)={0x60, 0xfffffffffffffffe, 0x6, {{0x10000, 0x9, 0x81, 0x5, 0x5, 0x80, 0xf769, 0xffffffff}}}, 0x60) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x400, 0x0) symlinkat(&(0x7f0000000240)='./file0/file0\x00', r1, &(0x7f00000002c0)='./file0/file0\x00') r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000002000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) userfaultfd(0x80800) write$FUSE_OPEN(r0, &(0x7f0000000040)={0xfffffffffffffcb0, 0xfffffffffffffffe, 0x3}, 0x163) [ 499.229898] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 11:47:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) 11:47:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x100000000000000}) 11:47:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000300", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 499.494351] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 499.554370] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000001c0)={{0x20, 0x0, 0x400000, 0x8, 0xfffffffffffffffb, 0x3}, 0x80, 0x7fff, 0x2, 0x9, 0x81, "08537cf63709a3afdb104cb50cfaeef46c76675e044e92f5bdd9806ea98763507673da7a7cdc51bf6dd48a42bce259cbcafd841aff1f00b6e6105d728095f3325c01a734b6f157a6b8bbff734f407e7e660a31b7f99f3f76bdd5145ae55b7f8d7558b8b911e63c1463c09dbf61afde43fa35d7a8945234be57a221ba46e932ff"}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000040)={0x81, 0x0, [0x3]}) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0x2, 0x0, 0x0, @msi}]}) close(r0) 11:47:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x748d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x1000000000000000}) 11:47:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 499.989931] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 500.033803] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x8, &(0x7f0000000180)=[{0x1, 0x4, 0x3, 0xffffffff}, {0x100, 0xe6, 0x8, 0x3}, {0xff, 0x7f, 0xc, 0x8000}, {0x6, 0x2, 0x9, 0xffffffffffffff81}, {0x6, 0x1, 0x7fffffff, 0x6}, {0x2, 0x4, 0x9, 0x10000}, {0x3, 0xc7, 0x0, 0x3ff}, {0x1, 0x8, 0xcd4, 0x10000}]}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:25 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x1000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x1000000}) 11:47:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0xb, 0x3) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") close(r0) r2 = dup3(r0, r0, 0x80000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xbc) 11:47:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="6664d91cc9d55d952f7293c05bdb39b525b53d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="585c198ff892b4f7d1128166133caa03a08c92239376f4fb6896778e45cbc80e07ad8851f4bb27aa2619a271892a5abefdb423a57048c058288f63858e648339471be03748379fc7fa6604de9c143810087a1a1677673f1e3a236095f6e03344f66fa416d8a573cccaf6a10c96b7335ae5e7de3ca40b60c4ec94e112140951e59416ba694c362063fc7c0f33d5d7a49d46a7b0f12090008e9acc800000000000000000"]) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x3) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000002c0)=""/20, &(0x7f0000000400)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x80000001, 0x202, 0x5, 0x5, 0x0}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000340)={r3, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}}, 0x84) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 500.420313] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:25 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x8000, 0xc000) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000280)={{0x0, 0x3002, 0x0, 0x5, 0xecb, 0x2, 0x0, 0x2, 0x2, 0x20, 0xd40f, 0x400}, {0x7005, 0x102000, 0xc, 0x8001, 0x13e, 0x8, 0x9, 0x3, 0x2, 0x428b, 0x3, 0xfffffffffffffffb}, {0x105002, 0x5000, 0x0, 0xf8a, 0x0, 0x3, 0x800000000000000, 0x1, 0x8, 0x1ff, 0x1, 0x8000000000000}, {0x0, 0x10000, 0xf, 0xfffffffffffffffc, 0x0, 0x14, 0x3ff, 0x1, 0x3, 0x95b, 0x100, 0x9}, {0x10000, 0x3000, 0x13, 0x1f, 0x6, 0x63d, 0x7b, 0xfffffffffffffffb, 0x10000, 0x2, 0x3f, 0x81}, {0x0, 0xf000, 0xf, 0xff, 0x10001, 0x9, 0x5, 0x1, 0x8001, 0x10001, 0x100000000}, {0x100000, 0x0, 0xb, 0x1, 0xfffffffffffffffe, 0x8, 0x7ff, 0xfff, 0x200, 0xfffffffffffff6ce, 0xfff, 0x7}, {0x6000, 0x5000, 0xe, 0x3, 0x100000000, 0x40, 0xc2, 0x7ff, 0x5, 0xcc, 0x7, 0x7}, {0xf000}, {0x2, 0x7000}, 0x20040001, 0x0, 0x10002, 0x0, 0x8, 0x800, 0x7000, [0x9a8, 0xae1, 0x6]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000080)='fuse\x00', 0x20, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030112e757365725f64643d07129692bf84e3247198120d3085487f215152deccd4a579f831943d1bffa773b1f8aa1f05005c539c106aa29bf71b5bafd5ba77f3aa0e5b77feeaaa6e4844aad1e7c597957c92b84dd4906b6df26f89bb9531e0481d01e6694714eb607025ef09f866b4f379073fa34c9228a6210abedca9d34f82c1bc75bd7239459f1540efab23de1f849a11c276f0b72b63b091e19e4665af6179f2af4cbb8312d2e9571880109e8eda", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x10}) 11:47:25 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x818d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={@loopback={0x0, 0x1}, 0x6c, r3}) 11:47:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) tee(r0, r1, 0x42, 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xf000000000000000}, 0x8) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'irlan0\x00'}) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 500.495158] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:25 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x1f00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x100000000000000}) 11:47:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4a400, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0xab, 0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x2a00, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)="2f6465762f667573650016e5ccdc422f0bae053761a964aa9bac636d3fa1095bffe3ec32fe028f88b31204ff8d7e49e4b268636be45f7e5d90b91abc3c00d2cf48578b82c7b5539f997fa3d28d823b544caf30f2ba01ade2d397871bfff993aa77c0f42435ae6cea17865864fa83100a90239de2cccee0ab050782e100c752694009b8521ee326ae8fba46fa95efc12c8ce0ea805f", r2}, 0xfffffcde) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f00000012c0)=""/4096, 0x1000, &(0x7f0000000080)=""/29, 0x3}}, 0x68) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000002c0)={0x3, r2}) close(r0) [ 500.993607] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 501.039701] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x400c01, 0x0) mkdirat(r1, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) fcntl$setpipe(r0, 0x407, 0x1) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570aa1bbcc6c7c336424cfcd7f1eba3a260ab3a976c34a2675141574c48cd316243fdfdfee88ee2eaed708f540b48eb00345d71638ab7578bebadeaf9a98cdf76ea9698ed32ce6217b8c776dfbbcbb71d48f9020000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x40000080) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x600, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:26 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fchdir(r1) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x1000000}) 11:47:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="108754263f0000007c9c72000038a32c003e"]) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d81, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7940000000000, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000340)={0x7fff, {0x2, 0x4e24, @loopback=0x7f000001}, {0x2, 0x4e20, @multicast1=0xe0000001}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x30, 0x80, 0x0, 0x80000001, 0x8, &(0x7f0000000180)='tunl0\x00', 0x80000001, 0x1}) lstat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000480)) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:26 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x200) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f00000002c0)) close(r0) 11:47:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x100000}) [ 501.651888] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 501.731972] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x200000000}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0xe06abf812c9742ba, 0x84) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x10000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$void(r2, 0xc0045c77) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d76, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0xfffffdfd}) 11:47:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 502.052311] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 502.075528] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) write(r1, &(0x7f0000000540)="73be1f59d75208b046598c67537f54481a16569a2075eda9fd0f7efd061f68a86928246598ec16b65c10406445706921f4fdeb1a8f92ad885ec56a0d6cb089f6c5904e977b36faf4454c676a5f9481d9d5b6f64de506324e6fc264f698d44537b7f73bdab3d7bb4fd7a0faedac97b8f402cea1aa1ed99ff46c945e635227b64dbd6b2bf7d0af1fe299952791c877ad9e2a566a8e935cf68c91", 0x99) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0xffff, 0x0) recvfrom$inet(r2, &(0x7f00000001c0)=""/40, 0x28, 0x0, &(0x7f0000000280)={0x2, 0x4e22, @rand_addr=0x8000}, 0x10) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) fsync(r0) 11:47:27 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$notify(r1, 0x402, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl(r0, 0x7, &(0x7f0000000000)) close(r0) 11:47:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7b8d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x1000000000000000}) 11:47:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61748800", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x10000000000000}) 11:47:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x48, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:27 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000fedffe)}) fcntl$setlease(r0, 0x400, 0x3) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000080)={0x20}, 0x1) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000340)={0xff, 0xffffffffffffffff, 0xb, 0x6, 0xffffffff, 0x27, 0x81, 0x1, r5}, &(0x7f0000000380)=0x20) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}, @in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e20, 0x3, @loopback={0x0, 0x1}, 0xa89}], 0x3c) getsockname$unix(r3, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) fcntl$setstatus(r1, 0x4, 0x0) [ 502.834182] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="000000b00a550596cd56e34e762daeb902b52130810fa2659d72840bbeaf214309ef8576036e443320ec51f55d57ef9d6728807e3e078af1b361b88d49a20a21324c7c5146cb4548c54a5313843a7d0803a05a72230cd3b0c24dcce1bd28381d58bb14a3b6c1d05b4f4cb20e7064d2bdd4f1413bc54ba98d54811bd27e31328dc63ee0cfd7c89a01571fafbe09b801685878855be6e721cfcc188d1a6e0a90f8af2dc6eb5e37ca61bee0b9f4fc22c30867362df2309944c70a124b7f7b42af26f7dfa99c6fcf39c861e88b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c002adcd023139b3cfff0c4a4d33198c53b900371df9b2083c04623459ef464d711ee01c5f6237f1e8d911ef3d17e6dbff2e4b5f6bddd45e0e653e0c352562e02af5f41bfd8140695493c78bec1b9710980245e0be7a9e84a1a2e641fb5bdada1cb145c751411bc23b1afea7b2bcc201dd7131a55504600e8bbe0e289a49a5b1907590a88881aaf07cd47270a4e79bd29f765f3efb32da39cf82f3bfe270cb02d97f722d427df80ec0000000000001f29e35b960ab11f2330451e62bb0b513a51ca1757177f44adc862051ace1bce609e2947e2c4459882ff4b36006ac5caf068a7387b5530cc5a8ba54655f64ea5058ab401192c7aa36acc7f9a91ff28eebab0248b3e142f0111780d0df7e62788ed0a1b4a9abfa6a12b1aba2a22b6f9f8090dadeac7dab74eb174f1bb9a3a165607263b1872e8a53ad4cd017ff13653bb98d8d2623a831368bf218fbdaf6f7cf81c78997c6b4da353e8561dc01809163ce73c8df6d2ab58adebff377f875c05f67ef9456cd1856d7c05b8660d69d51f2a886293f99ff2e65d3d5869e9ffad634fe6a6e7b5b1019650e34d8349534e658315f436192780e174a43914d2526fac96642e00541784a4de9c929588474e23d52927a2cc91ad6a0a040bfc62f03d13eeedc23a20193c1bb5a8e027eea04bcce00ba19fdbf987a5877f4b5f076aa9ac4f725a992946da60e395f715985989fe68f4de07f754069735b8a4509f5159e0a58859815bb7eac6a1c2ea9ebfb52d65d68b424db000e85230f0346a2bb7eadb65b9c7be3b498df9c531bf50f5f0f5e674a9f676d5c0135983c500000000000000000000fef51bf7da33f0034a176553d0e67bb96498d7cf8ac9216c0ea688309ab617c06f15237e707415bd09046de1984d1f6320fd8871fc11"]) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000900)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) pread64(r0, &(0x7f0000000340)=""/173, 0xad, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0xd34) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000002000), 0x1000) mkdir(&(0x7f00000008c0)='./file0/file0\x00', 0x40) r3 = request_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='/dev/fuse\x00', 0x0) r4 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, r3, &(0x7f00000007c0)=[{&(0x7f0000000540)="3315bf05dde23c91306b8237b0c70f0a7eacd47b10f1b8fa143bc361bc8f18370fad67957d4d7af9fe3dd39e9c90e1104d2471c45e2242f6f3b6f84a5b73bbcdd9e7533ab5e96c5d6ad7d5f737856d65e2b679ec6e1938d961c0626efd03de5bd07e63e0db5ef3426b051a62efe1acd6e37021987e2961e6520aacb5c481d4f1ea7af0587a5b30aff8c90927e4", 0x8d}, {&(0x7f0000000600)="b963ebf0853a21d1656defb8546fa85d2c5cf0210f47512973c630eb0e3ff609f1800bac585537b60d376c36396fae8908f8c100bbdcfe6bb41bb94fe4ba25a7ecabeba7b3079bc8d21d9ea5bb11658c4ad0b22e65ea790de3c0b5a4e438c5e5cf6a0917031b844a81888e4ddd47dd3dd14c813c55615443c06348209c382938aec34c3c3fe64e8776a603bdf1e4462c3d0bd2c35920ee8d4a909d83128491b83fdadb3e1500885285f6612d11b28b7da34a6d3eaedf14ca231de25744173c7f5c6cb5e1dae03c68b7bc72427fa486f7c7fe0b", 0xd3}, {&(0x7f0000003000)="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", 0x1000}, {&(0x7f00000004c0)="82cd6e1473e3a9d0f7511940261f398032db16026987fa454f111c47baf3ee24badba34b1ac306a32dc4bbca994dfc4c084100eff27c3b9c5899", 0x3a}, {&(0x7f0000004000)="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", 0x1000}, {&(0x7f0000000700)="71c8661b314bbecceebfcae992602b8cb95dc1323eb60b4aa0a2c7aa09fe946a500ab31e7d49d3870bf910aef73950a888630bd914572a27f97b0b0001846e95b2ce9c7f4164aaf5bdcc9bf4", 0x4c}, {&(0x7f0000000780)="427081a9a4d8a4465c1c735a8f4cc4e18868a763a4e4a97ec1366a6e8d37bc9d353c55d43b1e51fa1f984e5919ea64af7465727bdfdd", 0x36}], 0x7, r4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101200, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x9) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r6, &(0x7f00000002c0)=0x4) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0xfdfdffff00000000}) [ 502.888495] binder: 28574:28575 ioctl c0306201 20000080 returned -14 [ 502.908488] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffffffff00000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 502.935099] binder_alloc: binder_alloc_mmap_handler: 28574 20000000-20002000 already mapped failed -16 [ 502.959816] binder: 28574:28580 ioctl c0306201 20000080 returned -14 11:47:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c83"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0xfdfdffff}) 11:47:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:28 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x3f00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 503.162918] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 503.209158] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c675cb1000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x983f751015644af8) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0x10000, 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb92, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1}, &(0x7f0000000080)=0xc) close(r0) 11:47:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='rd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5dc, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xe4ffffff00000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x10000000}) 11:47:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='coredump_filter\x00') ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000180)={0x3, [0x0, 0x0, 0x0]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740300", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x7, 0x802, 0x0) write(r1, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x22) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0xfdfdffff}) 11:47:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x9, &(0x7f0000000040)="025cc83d6d345f8f762070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x81, 0x7e, &(0x7f00000001c0)="d611b1dda20ee6d8963948991079767d9cc1e46641181fb08a83efde80049b3e4653563bb56c679165fc8ea2f9df0ec7ae32cd7f0c0609cbe6a563797ef23348bcc7854bccf062a713c15b859d015ebb93358a4cdc696e0716dd24d403b8e02dae617f65f34778c045ed3ed4873ef2c85d705bfe91910b25b625edb9ae07f64a46", &(0x7f0000000080)=""/126, 0x2}, 0x28) close(r0) 11:47:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xa000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 504.132514] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="69643d00652b23e70000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000002c0)={0x6}, 0x1) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xb715, 0x403) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000180)={0x81, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x300, 0x8, 0xfffffffffffffffe, 0x7ff, 0xffffffff, 0x0, 0x7fff, 0xb00, 0x2}) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x10}) [ 504.220969] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000008c0)='/dev/input/mouse#\x00', 0x583ebb3d, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000900)=0x8, 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000001100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7e8d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x111000) close(r0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xf5, 0x0) 11:47:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x20000000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000180)=0x10, 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x1000000000000000}) 11:47:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:29 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) [ 504.381430] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 504.452514] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2d) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000240)='/dev/fuse\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group\x00id=', @ANYRESDEC=0x0, @ANYBLOB="2c002c346cf0db4e6213f0c1e32d5840ee6a7ff9605ce4fc9543f9acd121bfb2c1402ea1932065d2a71e71552df89240c5f2296f7d62ba9a70982875f56a7d8869bd95231dffddbcab9201902cdbd21c6954a8efc5e0e50712f7c5c593f73375e7aacd9a2a8858070c182a1c54f512e22f510754b6f066d2fd3c056773e1f9a068f7d9cb413bf7eef159cb38811b19f3801903"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x3) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x100000000000000}}, 0x20) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7a00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030306268000030303030303030303430b496a1ad757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x10000000000000}) 11:47:30 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x9, 0x30, 0x6, 0x40}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e23, 0x4, @loopback={0x0, 0x1}}}, 0xb00e, 0xfffffffffffffffc, 0x400, 0x7fff, 0xed}, 0x98) 11:47:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d7a, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffd, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f05006d6fe4653d3030303030303030303030303030303030b2a244303030722c757365725f69643db19fc7e98be127dbbc8f81af24c8a80fcbc2632e27b0bfe2dbcf7c719ca3fe42993c104f27b483a2891e0f59a6f5a174e4d1ce32e1e16e83bc51c00ed4f971b00e502b7abd2f276d13f3bce33c8f1cbd2cc2c4c7af8832aaa92ef026f69d4c9c71f689048b400768", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = dup(r0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000280)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000340)={{0x2, 0x6, 0x6, 0x5, 'syz1\x00', 0x10001}, 0x4, 0x3, 0x6, r3, 0x1, 0x9, 'syz0\x00', &(0x7f00000002c0)=['}keyringwlan0\x00'], 0xe, [], [0xb0b, 0x8, 0x10001, 0x6]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x6, 0x4, 0xb0a7, 0xffe0000000000000, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={r4, 0x200}, &(0x7f0000000240)=0x8) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 505.254618] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 505.316272] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES16=r0, @ANYRES32=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x2, {0x0, 0x3}}, 0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xfffffff0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x1000000}) 11:47:30 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x81, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61741100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746da71acf42302a30303030303030303034303030302c757365725f69643da4c92e3687c4eeeb88d1a44923958071b5f07cb9afa60bf45c2921e13f060cae8a3b20c29b9373e298bd0f8d9fe03807cb580ba385cec186771be740200ffd68b36d52143a9b4d21ec5762154c0eb400000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x8cffffff00000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x10000000}) 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x100, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f760070") r3 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2800) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:30 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7f, 0x800) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000040)={0x4, 0x1f}) [ 505.599360] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:30 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0xfffffffffffffffe, 0x20000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x191000, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000480)=0x0) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000000740)={0x0, 0x0}) r9 = geteuid() fstat(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = fcntl$getown(r3, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) r13 = getgid() sendmmsg$unix(r1, &(0x7f0000000a00)=[{&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000540)="ceeb4be4038710db7069168ac57b4c7edf1fda2d28cd3d7663509dd2146e9b88f267e6c399c5c3f8c379df800345dfb7479e4ac632523f0aff94e8baf3b45c352398fa1b65afe73e45fd351a374aedd5d419791cea8ba0341037558a4a6fc4ad1c829f97800675784d182059157c514852e74eecebff494c724641910789645007ecaab35fa82f1f135bcfa0fc607091212539e38812d2ce80d23991f167842baac61ee1a272e5e021f51bccfe903f2f160ca9d494a6f388d99b7e69077fc591af029c4b79f12ada485547583163c5ff07600ee1dfe6", 0xd6}], 0x1, 0x0, 0x0, 0x4000010}, {&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000002000)="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", 0x1000}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0002000000000000000000000000000000000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x80}], 0x2, 0x40) write$FUSE_OPEN(r2, &(0x7f0000000ac0)={0x20, 0xfffffffffffffffe, 0x800000000000003}, 0x20) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x3f000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 505.668311] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000ffffffff00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0xfffffdfd}) [ 505.842196] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd{', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:30 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x80, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}, {@blksize={'blksize', 0x3d, 0xf640d158992c337c}, 0x2c}]}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x2000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x100000000000000}) [ 505.885992] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000007fffffff00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 506.018718] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 506.040663] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000180)=0x1e) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffffff7f, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) truncate(&(0x7f0000000080)='./file0\x00', 0x3) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0xfdfdffff00000000}) 11:47:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3467726f65fe603d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB="face077d865f8c"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:31 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8001, 0x1) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000000c0)={[{0x5, 0x101, 0x5, 0x5, 0xfff, 0x0, 0x8, 0x36b, 0x0, 0x91, 0x3, 0x80, 0x10666861}, {0x10000, 0x3ff, 0x8000, 0x1, 0x0, 0x14, 0x6, 0xdd, 0x1, 0xff, 0x100000000, 0x7ff, 0x581014c0}, {0x5, 0x3f, 0x1000, 0x7, 0x4, 0x8, 0x40, 0x995, 0xe0d, 0x3, 0xb551, 0x3, 0x6}], 0x1000}) chdir(&(0x7f0000000000)='./file0\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x500, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000007fffffe00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x100000}) 11:47:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8082, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0xb4, r3, 0x600, 0x70bd2b, 0x25dfdbfe, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5b}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x99}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback={0x0, 0x1}}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x24}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x3abd13c7b1137389}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x10}, 0x4) close(r0) 11:47:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d7b, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x33, 0x800000000000701) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000080)) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 506.871602] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 506.954081] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x440000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000480)={r2, 0x1, 0x6}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000008800", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = memfd_create(&(0x7f00000000c0)=',]\x00', 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xffffffff80000001, 0x301000) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x1, 0x3, 0x8001, 0x7ff, 0x7ff, 0x8001, 0x8, 0x0, 0x10001, 0x8, 0x9, 0x40}) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") vmsplice(r0, &(0x7f0000000180), 0x0, 0xb) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x22000, 0x0) lseek(r1, 0x0, 0x5) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2200210}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x94, r4, 0x100, 0x70bd2a, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x18}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x30}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x94}, 0x1, 0x0, 0x0, 0x15}, 0x8001) ioctl$VT_RESIZE(r3, 0x402c542c, &(0x7f0000000000)) [ 507.090300] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 507.121653] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r2 = geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}, 0x2c}, {@blksize={'blksize', 0x3d, 0xa00}, 0x2c}, {@blksize={'blksize', 0x3d, 0x200}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d}, 0x2c}]}}) msgget$private(0x0, 0x10) 11:47:32 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffff1f0000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000300", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x80, 0x100) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000180)={0x7, 0x100000001}) socket$inet6(0xa, 0x80807, 0x5) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x400, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000009300)=ANY=[@ANYBLOB="206000002c000700000056b68e4c00000000000000000000", @ANYRES32=r1, @ANYBLOB="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"], 0x6020}, 0x1, 0x0, 0x0, 0x801}, 0x1) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") recvmmsg(r0, &(0x7f0000009180)=[{{&(0x7f0000000180)=@pptp={0x0, 0x0, {0x0, @loopback}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0x4}, 0x2}, {{&(0x7f00000063c0)=@alg, 0x80, &(0x7f00000064c0)=[{&(0x7f0000006440)=""/94, 0x5e}], 0x1, &(0x7f0000006500)=""/75, 0x4b}, 0x8}, {{&(0x7f0000006580)=@l2, 0x80, &(0x7f00000068c0)=[{&(0x7f0000006600)=""/2, 0x2}, {&(0x7f0000006640)=""/48, 0x30}, {&(0x7f0000006680)=""/85, 0x55}, {&(0x7f0000006700)=""/218, 0xda}, {&(0x7f0000006800)=""/146, 0x92}], 0x5, &(0x7f0000006940)=""/57, 0x39, 0x24}, 0x7fff}, {{0x0, 0x0, &(0x7f0000006a00)=[{&(0x7f0000006980)=""/110, 0x6e}], 0x1, &(0x7f0000006a40)=""/4096, 0x1000, 0x1f}, 0x401}, {{&(0x7f0000007a40)=@xdp, 0x80, &(0x7f0000009000)=[{&(0x7f0000007ac0)=""/76, 0x4c}, {&(0x7f0000007b40)=""/20, 0x14}, {&(0x7f0000007b80)=""/251, 0xfb}, {&(0x7f0000007c80)=""/247, 0xf7}, {&(0x7f0000007d80)=""/214, 0xd6}, {&(0x7f0000007e80)=""/159, 0x9f}, {&(0x7f0000007f40)=""/4096, 0x1000}, {&(0x7f0000008f40)=""/159, 0x9f}], 0x8, &(0x7f0000009080)=""/237, 0xed, 0x8}, 0x3}], 0x5, 0x20, &(0x7f00000092c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x408842, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x90, r3, 0x1, 0x70bd29, 0x25dfdbff, {0x2}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x100) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000080)) 11:47:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)='\x00\x00') close(r0) socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x33, &(0x7f0000000100)=""/5, &(0x7f00000001c0)=0x5) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x4000) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000a948a32c5b199b8f8b1a066d2980eb0d1dbac683b70fc732bba906c2fd3e0df804fb35e90894cfe182382bb22793ce66b707379da5a8d2b06f89d2808d84"], 0x46, 0x800) 11:47:32 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x200000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 507.788409] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:32 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x40000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:32 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x50280) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f0000000100), r1, &(0x7f0000000240), 0x5, 0x3) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r2) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)=0xfffffffffffffffb) 11:47:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 507.901042] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @loopback=0x7f000001}, 0x16, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='lo\x00'}) 11:47:33 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000000, 0x400) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x140) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="49a1544ad16b8ef8451fc79cb5e5ebf8c8db62b05eec007044e9ef9ce589d151c5721edb345584e26cafcc7ee8e9150da255c436e4ed85975a0c4229f9aae8a1f4bf7c5061f7bdb575116d0548fc6b51abe8f49674525a7b1365aed43e08088bd329edc60dddf13f0000000000c86a741f0000283fdd5d7927a403e6dce30e3888a232349f000800000000000053d0c6bcf9f9758f141c410c15fffa929251826ed7897cf286b2232b66d73ed17c5b170107872a214b4fd89bdbb5535a8cf368d41c", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000080)={0x20, 0x0, 0x3, {0x100000000000000, 0x2}}, 0x20) 11:47:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000540)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x1, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f00000005c0)="ee", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) clock_nanosleep(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) 11:47:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000008800", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:33 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="4d00000051d548f9b9c367044338a4f6668cdf7ff7c5b189e52d4b97941a99d46f26f991b64dfc7f2eae6917ee6f9a8eb1778a3784a52b7b97ca5f5bb0c5cf516fe8c1656749de46aa9f8be8164b460900"], &(0x7f00000000c0)=0x55) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x0, 0x3, 0x4, 0x20, 0x10}, &(0x7f00000002c0)=0xffffffffffffff9d) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = getpid() r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$TIOCOUTQ(r5, 0x5411, &(0x7f0000000340)) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000380)=0x2, 0x4) sched_setparam(r4, &(0x7f0000000000)=0xffffffffffffff81) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000400)={'bond_slave_1\x00', &(0x7f00000003c0)=@ethtool_sfeatures={0x3b, 0x3, [{0x7c, 0x8}, {0xfffffffffffffff9, 0x5}, {0x7f, 0x100000000}]}}) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x480000, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f00000000c0)={0x9e18, 0x0, 0x1f, 0x0, 0x8, 0x5, 0x200}) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) getpriority(0x1, r3) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) [ 508.253912] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 508.331465] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1ff, 0x8000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0x9}}, 0x42f8, 0x3}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0x22, "b40cb4039c89f8309881be1b5d6c81b0c6892219f005baf14e1ca793fd42ff1fc609"}, &(0x7f0000000240)=0x2a) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) socket$netlink(0x10, 0x3, 0x13) 11:47:33 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7400, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='/dev/ptmx\x00'}, 0x10) r3 = getpid() fstat(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() r6 = getpgrp(0xffffffffffffffff) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000000740)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="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", 0xfa}, {&(0x7f0000000140)="36f22c7d80c94d226d3f42ed26c436330e9daabe1cda40cf118fd5fdc9b8fd56c192ee0dcdca6b6fae32a28632d675150e722149a45f02d6bdde159a659cca5452a9a58c8a3d64aa38affcec012b16fba981ea06503cede055fdeb0e9a91c99340147f40a0d058f3f89d7c34df41f6aaa7572a31c01facd70a9b8ef5c714eb31598a4243ddc44ae6301cc73a2123eaf4222a2d689f7b95787fbbf67041cf11f12105f9161c6a69df0f0debd4d664d0bd3649b0", 0xb3}, {&(0x7f0000000380)="325142145f3a61bbbd4f4f94d1be283bd8ae2ca071c2ea3ff8545901524983d7f589b8c445d96bd6badda5e200edcb71f6b0e452ca22884dd9845bb2c04db2da0c9eb88f20b5583baf2af0f49ea83e04403f9c4d59ff995b008237c196fcece024d49b122e1fc260f347e695cab8c6a73a2922d8b9351016eddeccdc21050cafc4670c9a25b60974140b777d40980b0fe59d0b9e93861f47f2b110d7962def46ba5ecbd935da482bd1635606a77baba7eaa590eebeae144d0b6c76bf68b1cba3ff769aa056bc844e3eacdd4896c7d86f9778fb9920d55ea6", 0xd8}, {&(0x7f0000000480)="e3802f8632b1e395a6a2126f96076d52d1a3a53099cbb2fa7d2ac67bb7994177a47e40e9279e68a53601a3ec53b43c27369bfdabc8634345115b794509f5ad6530ffa9f84698f371d237794a58221e2c209d", 0x52}], 0x4, &(0x7f0000000700)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x40, 0x44000}], 0x1, 0x80) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) 11:47:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6435925df45c78341109549630abfcac77cd7cd4c634f8e067e82ed5b4ecbed472b7922491ab0c5344c94d9c63fdd42de9409a86f3f1afb0deb9fe80949daf59659a48673547606d534b29580f7b2dc43d52de0e4e8df190a244d534f0b737820112b7a4d2f453abbbaa155fac951adfc5bc8bb6d0069a34370e0b46476eab26fa0865"]) read$FUSE(r0, &(0x7f0000002000), 0xfffffffffffffe5f) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xfffffffffffffcff) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:33 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x400) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x7}, &(0x7f00000001c0)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000400", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x430102, 0x0) close(r0) 11:47:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x4, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x400163}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xac3b42bc00d7f9cc, &(0x7f00001a7f05)=""/251}, 0x48) 11:47:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c30303030303030303030303030303030e1fc5b19302c757365725f69643d0000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x5, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:34 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x75b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) [ 509.005427] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10000, 0x8000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="e6e259", @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x48) read$FUSE(r0, &(0x7f0000002000), 0xfffffd22) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 11:47:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xfffffff6, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 509.099426] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfff, 0x4000) ioctl$TCSBRK(r2, 0x5409, 0x81) read$FUSE(r0, &(0x7f0000002000), 0x8b) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:35 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x1b, 0x2, 0x200) r1 = socket$inet6(0xa, 0x1, 0x40000000003) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740200", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:35 executing program 3: r0 = socket$inet6(0xa, 0xb, 0x6) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/9, 0x9, 0x100, &(0x7f0000000080)={0xa, 0x4e22, 0x3ff, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0xfffffffffffffffc}, 0x237) getpeername$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0xf1c8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000380)={@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x74, r2}) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:35 executing program 2: r0 = socket$kcm(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000480)="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") 11:47:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x2000000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x1da) execveat(r0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)=')\x00', &(0x7f0000000240)='rootmode', &(0x7f0000000280)='fuse\x00', &(0x7f00000002c0)='posix_acl_accessvmnet1-{-keyring\x00', &(0x7f0000000340)='rootmode'], &(0x7f00000004c0)=[&(0x7f00000003c0)='fuse\x00', &(0x7f0000000480)='user_id'], 0x400) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',groupIS_i', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000540)=""/162) sendto$packet(r0, &(0x7f0000002000)="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", 0x1000, 0x40000, 0x0, 0x0) 11:47:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 510.084275] device lo entered promiscuous mode 11:47:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7c8d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:35 executing program 0: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000540)="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") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0500000089", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tables_matches\x00') syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x36c, 0x10000) mkdirat(r2, &(0x7f00000002c0)='./file0/file0\x00', 0x10000180) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") keyctl$join(0x1, &(0x7f0000000040)={0x73, 0x79, 0x7a}) 11:47:35 executing program 3: r0 = socket$inet6(0xa, 0xffffffffffff, 0x1003) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x4, 0x1, 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x7, 0x4) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x80100, 0x0) write$P9_RLCREATE(r3, &(0x7f0000000180)={0x18, 0xf, 0x2, {{0x4, 0x3, 0x4}, 0xdea8}}, 0x18) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x111, 0x3}}, 0x20) [ 510.129356] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x3000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 510.224813] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:35 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x0, 0x7) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="025cc83d02345f8f762070") r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f00000000c0)) close(r0) 11:47:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@nat={'nat\x00', 0x19, 0x3, 0x4a0, [0x20000500, 0x0, 0x0, 0x20000530, 0x20000640], 0x0, &(0x7f0000000140), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'teql0\x00', 'bond_slave_1\x00', 'bond_slave_1\x00', 'ip6gre0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xa8, 0xa8, 0xe0, [@cluster={'cluster\x00', 0x10, {{0x8000}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'team_slave_0\x00', '\x00', 'bridge0\x00', 'gre0\x00', @empty, [], @random="1a0538d190dd", [], 0x70, 0xf8, 0x228}, [@arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:netutils_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth1_to_bridge\x00', 'yam0\x00', '\x00', 'veth0_to_bridge\x00', @random="9c6fd05736b7", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xa8, 0xd8}, [@snat={'snat\x00', 0x10, {{@random="bf393a482b6e", 0xffffffffffffffff}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x80}}}}]}]}, 0x518) 11:47:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 510.371720] xt_cluster: you have exceeded the maximum number of cluster nodes (32768 > 32) 11:47:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x100, 0x0) fadvise64(r1, 0x0, 0x0, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, 0x0]}, &(0x7f00000001c0)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getroute={0x14, 0x1a, 0x208, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1}, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174feffff0700", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1ff, 0x8000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0x9}}, 0x42f8, 0x3}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0x22, "b40cb4039c89f8309881be1b5d6c81b0c6892219f005baf14e1ca793fd42ff1fc609"}, &(0x7f0000000240)=0x2a) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) socket$netlink(0x10, 0x3, 0x13) 11:47:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d80, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:36 executing program 4: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000100)=0x5, 0x9, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0xfffffbfffffffffc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) r2 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000001c0)={0xfffffffffffffffe}, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x903}, &(0x7f0000000080)=0x8) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000200)={0x10000000}) r6 = eventfd2(0x91c, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000240)={r6, 0x7, 0x800, r4}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000000c0)={r5, 0x8, 0x30}, 0xc) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e22}, 0x10) 11:47:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000040)=0xffffffffffff1806, &(0x7f0000000080)=0x1) [ 511.183973] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x8, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) keyctl$set_reqkey_keyring(0xe, 0x6) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="020089495ba19989ca03060e45687e36502183cdeab50bc1de977a42841a60b90dafe547bfcda8c6"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) open$dir(&(0x7f0000000340)='./file0\x00', 0x20000, 0x2) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000280)) r1 = socket(0x5, 0x7, 0x2b100000000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000005000)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000f80)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000005180)={@multicast1, @local, 0x0}, &(0x7f00000051c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000009100)={@empty, @remote, 0x0}, &(0x7f0000009140)=0xc) r8 = accept4$packet(0xffffffffffffff9c, &(0x7f00000095c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000009600)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009800)={'veth0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000ba80)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f000000bd80)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f000000bd40)={&(0x7f000000bac0)={0x260, r2, 0x0, 0x70bd2c, 0x25dfdbff, {0x3}, [{{0x8, 0x1, r3}, {0x17c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffff352}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r6}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r7}, {0xc0, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r11}}, {0x8, 0x7}}}]}}]}, 0x260}, 0x1, 0x0, 0x0, 0x20000000}, 0xc004) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r12, 0x50, &(0x7f0000000740)}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) link(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) memfd_create(&(0x7f0000000080)='user_id', 0x1) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0xb5fe, 0x101000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f00000004c0)) [ 511.236887] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101040, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:36 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000002140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="541e00002800000027bd7000fddbdf2500000000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="080004000000030010000300e11a4eefc81232b2b1dc626008000400eeff07000c000100686673630000000034000200100001000000000007000000fdffffff100002000000000025f9000005000000100001000900000009000000070000000c0001006866736300000000440002001000010006000000090000007f00000010000300e300000009000000f8ffffff1000020005000000c10000000900000010000300ff0f000002000000040000000800010068746200681002000c00070000800000000000000404040000000000070000000700000006000000000000000010000002000000030000003f000000050000008e0f00000000000004000000000000000000000000000000ffffff7f0000000008000000ce0a0000ff7f00000600000014000000d291000040000000080000000100000000020000000000007900000020000000080000007f00000000040000ffff00000000000002000000ff03000001000080050000000700000003000000040000000800000015000000ff0000000300000000800000ffff000006000000b00c0000fdffffff553d0000060000000800000000800000060000000000000029000000000000800002000025ef4c0ff1b1367c0400000001000100008000000200000008000000070000004000000006000000ff030000bc0600002edd000004000000060000000600000003000000000000000400000093df000040000000060000000100000003000000040000000000000005000000000000000600000005000000000000000500000004000000800000000000000004000000010000000100000005000000031c0000040000000600000001000100001000000300000001040000ff03000000000000a5000000f0000000810000000600000004000000ff0700009b08000000000000030000ffff7900000100000003000000ff0300000101000001000000050000003f00000006000000050000000000000081000000000000001f0000000800000009000000810000000300000003000000ff03000006000000fffeffff0000000001000000060000000300000001000000010000009d00000001000000ff030000f7b50000020000000600000008000000740f0000090000000000000000020000edfa00001f0000008100000009000000e30b0000020000000900000000010000000000000d0100000700000001010000000200002f00000004000000060000000400000001000000030000000180000000000000d4000000050000000100000007000000ffffff7f0000000007000000010000000800000007000000020000004d09000000000080d2eb000000000080000000000200000006000000000000002000000005000000020000008a0000000600000001000000ec00000009000000e40a00000200000000040000fd000000050c0000050000000000000002000000e97200005c02000006000000070000006d08f1220000000003000000810000000300000000010000e2000000030000008c08000006000000ce0000000500000000000100450c000008000000f98ab65c03000000010001000200000000e41d3300400000c895000002000000000200000700000000f0ffff020000000008000000010000000001000000010002000000000000000200000006000000000000007fffffffff01000002000000300001000000000088de0010f7ffffff0001e7e10500ff000101000000000000feffffff0300000001000000080000000c00060005000000000000000c0006003f0000000000000004040300ff00000000000000020000000800000006350000070000000900000001000000496c0000b202000001000100000004000300000009000000e30000000080000000000000044b0000010000000300000004000000080000001647cf580000000005000000ffff0000000400000800000000080000400000003f00000004000000000001000800000007000000010000800000000040000000ffffff7f1f000000090000006f0800000000000000000000000000000a00000090a80000c800000005000000010000000000000001040000000000000600000001010000018000002a00000000000000030000000500000000140000480c00000100000009000000db00000000000000ffffff7f080000000000000004000000a783000001010000030000000800000081000000030000009a920000030000000400000007000000ffffffff0600000009000000e3010000ff0f000009000000000000000300000093030000040000000500000000000000050000000004000000000000fc0c000009000000ff0000000900000000020000000000000400000006000000070000000001000004000000ff030000f8ffffff0700000008000000030000000700000009000000008000003b180000400000000010000000800000010000001d000000ba0c00000600000004000000fbffffff000000007f000000060000002a0000000600000001000000210300000400000007000000060000000000000006000000faffffff010000000000000005000000ffffff7f0800000040000000ffffffff9baa00000104000000100000000800000700000004000000d2000000060000002c08000007000000bd00000003000000050000000200000009000000ff010000080000000500000000800000da000000ffff0000070000000000010000000100050000000000008000080000000400000100000001feffff5100000000020000dfbb0000060000000500000000000000060000000400000053000000010000000600000007000000ff0f0000040000000000000024a0000001000000050000000200000005000000020000000100000080000000400000000104000001000100040000000002000000f0ffffffffff7f01000000ca000000340f0000da74000000000000090000000100008005000000010e0000ff030000050000001100000000000100008000002ebf000004000000080000006901000007000000040000000180000007000000c1ffffff040000000100000000000800ffffffff02000000a5900a21e5a6000002000000ffffffff00000000f8ffffff0000000005000000feffffff000000000040000008000000010000800600000005000000060000000500000003000000ffffffff2000000005000000000000000600000008000000040404000800000007000000ff0100000800000000100000430900000600000000080000020000000200000001000000ff030000ff07000003000000060000000300000007000000050000000000000000010000ff010000010001000f2b0000600000000600000000000000030000000600000000040000010000800900000034040000ff030000030000000500000000100000010000000100000062a700000100000005000000090000000600000007000000010001000600000001000000090000000900000094b9000008000000ffffff7f01000080ff070000f3d4000002000000060000000000000000000000010000000000000072060000e000000003000000a9000000ff0000000900000007000000542e0000c8e0000001000000a6ad000000040000000000000600000005000000010000000200000008000000faffffffde08000001000000feffffffdd44ffff0400000001000000fbffffff0200000041f3ffff00000000000000000500000004000000ff03000001800000000000000100000020000000ffffff7f0100000000000080ff7f00000800000010b10000fdffffff810000001f000000ff070000020000000500000008000000dbc100000800000000000000f7ffffff040000000300000081000000172b000069a6000022010000f80500007f000000050000000400000004000000ffffff7f0200000005000000d22c0000a5000000ff000000ff7f0000fcffffff010000000400000000000000080000000800000000f4ffff09000000ff00000004000000018000008100000006000000fb0400000200000006000000ff030000010100000800000001000000ffffff7f00000000030000003e8800000100000001000000000000000200000004000000010400000800000006000000040000000700000000100000040000000000ffff050000005972000001000000010000000400000004000000050000007dffffff090000000000000008000000e7eb00006b4700006b930000090000006600000001000080ff0f000001800000000100001405000005000000000000000600000004000000fcffffff7f00000004000000d60e00000800000094000000ff0f0000000000000200000088630000c8ffffff7cb1ab002e0000002000000006000000060000008bd50000010000001f0000003f00000008000000010400003f000000060000000100000002000000f709000004000000ff0000000600000004000000ff0100000100000005000000ff07000005000000090000001c0a0000030000000000000003000000060000007f0000000200000001000000ff0300000200000000080000000000000700000009000000f107000000000100ae0000002d0600000100000057020000a765000005000000010100000200000004040400f9ffffff48000000020000001f000000cb0c00000100000005000000080000000000000000000000aa0000003bf3ffff1f00000012dc652081000000000800000600000001000000be0c00000300000000000000000000003f000000ff0f0000ff0f000004000000040000009e0f00009e07000085000000ff7f00008100000001000000070000000100000001000000070000007f0000000000000001000000ff00000001000000050000000100000005000000ff7f0000810e00000900000039e700000700000007000000000000000008000008000000070000000400000000000100080000001f000000010000800100000021b0000020000000f600000008000000f80300000500000009000000030000003f00000007000000030000000600000000000000bc0600000800000005c30000ff00000000000000000200000100000001000000f200000000000000550000000000003807000000b10e000002000000200000001609000008000000ffffffff0900000071000000faffffff000000009148000009000000c1050000090000000080000006000000ff010000020000000000000001feffff0000000000000000ff070000ff0f0000010000000180000080ffffff00000000050000000600000007000000880d0000eca00000c611000000000080000400000100010005000000060000000500000020000000020000000600000000000000230000000700000001040000f11d00006a0e0000010000800900000000000000010000000000000006000000090000000100000000000000db080000d3030000000200003f00000001800000070000004000000009000000f9ffffff750000000500000005000000040000000100008000040000000000002052000001000000ff00000000f0ffff3f000000fcffffffff0000000800000009000000ffff00002900000003000000060000000500000005ea0000060000000300000002000000000001000900000009000000350c000040000000010000000600000000000000ff07000000000000000000003f5e00000600000007000000030000000008000001000000080000008000000099030000030000000800000008000000fffeffff05000000000000008000000007000000010001000300000007000000090000005c0000004163774201000000008000003f00000009000000ffff0000040000006bffffff07000000050000000001000099fbffff070000000300000005000000060000000200000000000000400000001e00000000000000010000000100000081000000050000000000000009000000010000000900000000000000426000000001000000000000040000001500000004000000ff0100000600000000000000feffffff40000000000200000010000004000000"], 0x1e54}, 0x1, 0x0, 0x0, 0x800}, 0x80) 11:47:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030a4d70fef303430303030087569d44983161bed", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0c00c82bdd606cb2df88539df28e97c035764948838a0e64d0391a71ae178f532acb9c0fed795947b8b6097fc643b91a63403ec0149bdf842c8c0196342a3625f5ed0a04296400d86a4a317af00a2f5d7baf0ed7175f272c72196e6b56ace763f912baa636e8f552d802dd131aff5096d583051dc300067805c9850a66ad420aaad88981c1f5046de022f47a46aa3022751b55f5552de0f3db5f3b9f9e466692b0d2005d838d999957c129b1c2e24f53d0097968ec0c69acd28a26efff55ef4e03d51106fe5095a20f7b74b13344891a0287d36b66b43c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x4402, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)=0x0) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='fuse\x00', 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72e3764923d3f52d653d303030303030303030303030303032303030302c757365725f69643d60983c36b3d235e39b800a731329581fe5f751822fdde485bd36b9e483cd1e7fe3703684a367c4bdf8bfe75ea4a4ac4c92193d866ed7a7aec68bb7ce35e85e7968bc31d7b425405d0fa4680c3992747021aa3a35d43b1f7a0a8165563e0ab982aad500b81c4a74c2c286320a238990311ead8c51381c7d83c40ddfb7550e765a4906df344418115b645f267c5a43d196883dbb7725bde03a1c4e29bacd296b65f4a68da30d1c32013d7770436c5512c2d2d34e533ec03b8acebb15898266c0f7f151923492d90c", @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',max_read=0x0000000000000009,max_read=0x0000000000000005,default_permissions,default_permissions,default_permissions,\x00']) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000001c0)={0x415b, 0xffffffffffffffff, 0xbc}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x80, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000080)={0x7, 0x3, 0xc9}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) [ 511.402153] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xf6ffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 511.460555] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = accept4$inet6(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x800) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x30080, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}, 0x2c}, {@max_read={'max_read', 0x3d, 0x6}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@blksize={'blksize', 0x3d}, 0x2c}]}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:37 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x34, 0x8000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00032bbd7000ffdbdf25040000000000bb0b534c2cd67d63b99f73b80500060092f7311405000200000008000400ffffffff080005"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x20000014) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x20000, 0x0) write$P9_RFLUSH(r4, &(0x7f00000000c0)={0x1000000fc, 0x6d, 0x4}, 0xfffffffffffffef1) close(r0) 11:47:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x1000000002) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x10, 0x807, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKDIR(r0, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x2, 0x4, 0x5}}, 0x14) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18, 0x0, 0x1, {0x6}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030306b1f351de628303030303034303030302c7573", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xa, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:37 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8001, 0x1) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000000c0)={[{0x5, 0x101, 0x5, 0x5, 0xfff, 0x0, 0x8, 0x36b, 0x0, 0x91, 0x3, 0x80, 0x10666861}, {0x10000, 0x3ff, 0x8000, 0x1, 0x0, 0x14, 0x6, 0xdd, 0x1, 0xff, 0x100000000, 0x7ff, 0x581014c0}, {0x5, 0x3f, 0x1000, 0x7, 0x4, 0x8, 0x40, 0x995, 0xe0d, 0x3, 0xb551, 0x3, 0x6}], 0x1000}) chdir(&(0x7f0000000000)='./file0\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7e8d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 512.410845] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ftruncate(r0, 0x101) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc82070000000000000") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x143001, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000080)={0xe4, 0x29, 0x1, {0x10001, [{{0x41, 0x3}, 0x10000, 0x1abd, 0x7, './file0'}, {{0x80, 0x4, 0x4}, 0x400, 0x7, 0x7, './file0'}, {{0x4, 0x0, 0x2}, 0x2, 0x4, 0x7, './file0'}, {{0x19}, 0x4, 0x1, 0x7, './file0'}, {{0x0, 0x4, 0x1}, 0x76c0, 0x1, 0x7, './file0'}, {{0x4e, 0x1}, 0x0, 0x2, 0x7, './file0'}, {{0xe8, 0x3, 0x2}, 0x3f, 0x2, 0x7, './file0'}]}}, 0xe4) ioctl$TCSBRK(r1, 0x5409, 0xffffffff) 11:47:37 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x440005, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x101, 0x7, [0x6, 0xfffffffffffffffa, 0x4, 0x2, 0x27, 0x1f, 0xfffffffffffffff9]}, &(0x7f0000000300)=0x16) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000440)={r1, @in6={{0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x400}}}, 0x84) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getrusage(0x0, &(0x7f0000000500)) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff]}, 0x2}}, 0x1000, 0x1f, 0x1f, 0x6, 0x42}, &(0x7f0000000080)=0x98) close(r2) 11:47:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x196a, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:37 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8001, 0x1) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000000c0)={[{0x5, 0x101, 0x5, 0x5, 0xfff, 0x0, 0x8, 0x36b, 0x0, 0x91, 0x3, 0x80, 0x10666861}, {0x10000, 0x3ff, 0x8000, 0x1, 0x0, 0x14, 0x6, 0xdd, 0x1, 0xff, 0x100000000, 0x7ff, 0x581014c0}, {0x5, 0x3f, 0x1000, 0x7, 0x4, 0x8, 0x40, 0x995, 0xe0d, 0x3, 0xb551, 0x3, 0x6}], 0x1000}) chdir(&(0x7f0000000000)='./file0\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 512.475581] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x9000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000300", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 512.643922] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 512.677733] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000180)={0x5, 0x1, 0x4f, 0x82d0, 0x1}, 0xc) ioctl(r1, 0x80000808912, &(0x7f00000002c0)="025cbd0d6d0003fcff00008000780622409ce9f67a211773b66615e049e63184a514527da5dd917e7fb2d648") r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x841, 0x88) read$FUSE(r0, &(0x7f0000002000), 0x300) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f00000001c0)) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = fcntl$getown(r0, 0x9) r2 = dup(r0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000100)) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="5d51ffdde08c2482c2272ef7bf0f3611ab8e7c5e46322ceaf00661520c9aab1cb295ae721104dd137c4db1") ioctl$VT_RESIZE(r3, 0x402c542c, &(0x7f0000000000)) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000000c0)={0x6f7, 0x8e}) 11:47:38 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x2, r2}) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40000) socket$kcm(0x29, 0x7, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0)=0x9, 0x4) pkey_alloc(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000001c0)={r3, r3}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vlan0\x00', 0x2}) 11:47:38 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) 11:47:38 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7a, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:38 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xc00000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='+wlan1\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x4, 0x5, 0x100000001}, 0x6}, 0x20, 0x1, 0x0) 11:47:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:38 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x2, r2}) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40000) socket$kcm(0x29, 0x7, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0)=0x9, 0x4) pkey_alloc(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000001c0)={r3, r3}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vlan0\x00', 0x2}) [ 513.486343] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = dup3(r0, r0, 0x80000) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 513.578280] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@mcast1={0xff, 0x1, [], 0x1}, 0x58, r2}) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:38 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7b8d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:38 executing program 2 (fault-call:7 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 513.838417] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 513.880314] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 514.621676] FAULT_INJECTION: forcing a failure. [ 514.621676] name failslab, interval 1, probability 0, space 0, times 0 [ 514.632965] CPU: 0 PID: 29210 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 514.640324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.649673] Call Trace: [ 514.652257] dump_stack+0x1c9/0x2b4 [ 514.655878] ? dump_stack_print_info.cold.2+0x52/0x52 [ 514.661061] should_fail.cold.4+0xa/0x1a [ 514.665109] ? lock_downgrade+0x8f0/0x8f0 [ 514.669246] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 514.674336] ? find_held_lock+0x36/0x1c0 [ 514.678394] ? find_held_lock+0x36/0x1c0 [ 514.682451] ? check_same_owner+0x340/0x340 [ 514.686756] ? rcu_note_context_switch+0x730/0x730 [ 514.691671] ? wait_for_completion+0x8d0/0x8d0 [ 514.696239] __should_failslab+0x124/0x180 [ 514.700458] should_failslab+0x9/0x14 [ 514.704246] kmem_cache_alloc+0x2af/0x760 [ 514.708385] getname_flags+0xd0/0x5a0 [ 514.712174] getname+0x19/0x20 [ 514.715349] do_sys_open+0x3a2/0x760 [ 514.719050] ? filp_open+0x80/0x80 [ 514.722575] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 514.728112] ? ksys_ioctl+0x81/0xd0 [ 514.731732] __x64_sys_open+0x7e/0xc0 [ 514.735519] do_syscall_64+0x1b9/0x820 [ 514.739388] ? finish_task_switch+0x1d3/0x870 [ 514.743868] ? syscall_return_slowpath+0x5e0/0x5e0 [ 514.748779] ? syscall_return_slowpath+0x31d/0x5e0 [ 514.753699] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 514.759053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 514.763887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.769058] RIP: 0033:0x455a79 [ 514.772227] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.791466] RSP: 002b:00007feef069ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 514.799156] RAX: ffffffffffffffda RBX: 00007feef069b6d4 RCX: 0000000000455a79 [ 514.806406] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00000000200000c0 [ 514.813658] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 11:47:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) open$dir(&(0x7f00000001c0)='./file0/file0\x00', 0x480, 0x9d) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x700000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x8, 0x7f, 0xff, 0x6}) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x81) [ 514.820912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 514.828162] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000000 11:47:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x8000) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x4) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc8bd6d340000000070") write(r0, &(0x7f0000000100)="2c8ce7eaa9518ca786451c0128e44789a078bb7a4f6dab727e84d5a1b317a27bab769dba8080f90f3f7466f38725dee1c3c224ecafbf93a5e4d49dcd66c55a2c", 0x40) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x300000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 514.930253] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:40 executing program 2 (fault-call:7 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x2, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = semget$private(0x0, 0x4, 0x2) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r5 = getegid() semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000380)={{0xdd, r2, r3, r4, r5, 0x2, 0x958}, 0x4, 0x2, 0x80000001}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2040, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000000940)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005004000000000000000000001801000068030000680300006803000004000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004155444954000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020300000202000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0003801000000000000000000000000000000000000000000000000000048004c454400000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000900000006f70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000002125b0956a821627b847d68d5f7a2ebbaaa9d5146f1f8258042531ba51dc582b3ea7b23f3cf2dcab1bf8980c3ee7adc40659e39b93426b413f3de7ca6d8f9eb1724388a8c3ed93490c0750f126a173e7f277985adb912e35a6b2cc61c24eb32639f2fb01b3ace4ff45d5b8ff22d0fb94587197fdb39da72132850ccde5b6c2e1e4186691d236bb9781af37dfbd61fbeac270921254117a1c8fe788b656e54f6532d8c580ebb2bb2e27668fd97726bba5433299899307bb16c0c3f30fd02c728568907226248811f18f187d5ee091adaa2b232592fcea0e7233bb47599adad3d4c46d570337c8b84845c1dbde303a8720d3a5300b19549c4176cd8d10f2ba7b3f"], 0x4a0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24001, 0x0) ioctl$VT_RESIZE(r7, 0x402c542c, &(0x7f0000000000)) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000040)={0x4}) 11:47:40 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xfeffffff00000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 514.995871] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643d4442c35c139532d8187b6e857e4469b6e7f63b67b4cba02a26c9ec731bc1d33278ff4b830ef5ec785a887ae5ad4991d48e6704ac4d435612a597ebc506df20533427b377560c63e4406ab3c3d503ffa9d3458574da6b8ec38721dcfffa8774da1237b5c3312285d8a67b6771f2a25540213a9d9c", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',Qr\b\x00\x00\x00id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:40 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") socket$inet6(0xa, 0x0, 0x7f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e20, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x5}}, 0x3f, 0x4, 0x5, "74a53cbf00bdc790fff1319aa059d191c502ed59457afaf12f951aeeb4b759ea7dc92fe2591d38ec8fb38e29b86afc9028640fb28f2084eadbdb10ab73daa2370da21261a3e440afdb29096c93a4f837"}, 0xd8) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x200, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) [ 515.123533] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:40 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffffff8c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 515.183239] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 515.872188] FAULT_INJECTION: forcing a failure. [ 515.872188] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 515.884010] CPU: 0 PID: 29273 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 515.891364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.900712] Call Trace: [ 515.903291] dump_stack+0x1c9/0x2b4 [ 515.906904] ? dump_stack_print_info.cold.2+0x52/0x52 [ 515.912088] should_fail.cold.4+0xa/0x1a [ 515.916137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 515.921231] ? trace_hardirqs_on+0x10/0x10 [ 515.925449] ? _parse_integer+0x13b/0x190 [ 515.929581] ? graph_lock+0x170/0x170 [ 515.933369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.938894] ? _kstrtoull+0x188/0x250 [ 515.942683] ? _parse_integer+0x190/0x190 [ 515.946822] ? graph_lock+0x170/0x170 [ 515.950610] ? lock_release+0xa30/0xa30 [ 515.954570] ? find_held_lock+0x36/0x1c0 [ 515.958618] ? graph_lock+0x170/0x170 [ 515.962406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.967926] ? should_fail+0x223/0xbed [ 515.971799] ? lock_downgrade+0x8f0/0x8f0 [ 515.975937] __alloc_pages_nodemask+0x36e/0xdb0 [ 515.980592] ? find_held_lock+0x36/0x1c0 [ 515.984641] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 515.989644] ? find_held_lock+0x36/0x1c0 [ 515.993694] ? hci_conn_request_evt.isra.47+0xf50/0x1120 [ 515.999137] ? check_same_owner+0x340/0x340 [ 516.003445] cache_grow_begin+0x91/0x710 [ 516.007493] kmem_cache_alloc+0x689/0x760 [ 516.011631] getname_flags+0xd0/0x5a0 [ 516.015420] getname+0x19/0x20 [ 516.018597] do_sys_open+0x3a2/0x760 [ 516.022293] ? filp_open+0x80/0x80 [ 516.025820] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.031342] ? ksys_ioctl+0x81/0xd0 [ 516.034957] __x64_sys_open+0x7e/0xc0 [ 516.038746] do_syscall_64+0x1b9/0x820 [ 516.042615] ? finish_task_switch+0x1d3/0x870 [ 516.047096] ? syscall_return_slowpath+0x5e0/0x5e0 [ 516.052013] ? syscall_return_slowpath+0x31d/0x5e0 [ 516.056936] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 516.062285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 516.067116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.072290] RIP: 0033:0x455a79 [ 516.075457] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.094683] RSP: 002b:00007feef069ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 516.102381] RAX: ffffffffffffffda RBX: 00007feef069b6d4 RCX: 0000000000455a79 [ 516.109632] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00000000200000c0 11:47:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="6c010000f0f6000005020003c20400000040000000000000"], 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x1) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x20000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) signalfd4(r1, &(0x7f0000000180), 0x8, 0x800) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000240)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000540)={0x5, {{0xa, 0x4e20, 0xfff, @empty, 0x704e}}, 0x0, 0x7, [{{0xa, 0x4e24, 0xffffffffffffff01, @empty, 0xffff}}, {{0xa, 0x4e22, 0x5776, @ipv4={[], [0xff, 0xff]}, 0x2}}, {{0xa, 0x4e23, 0x4, @loopback={0x0, 0x1}, 0x800}}, {{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xa}, 0x8}}, {{0xa, 0x4e24, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x401}}, {{0xa, 0x4e22, 0xc8, @mcast1={0xff, 0x1, [], 0x1}, 0x4}}, {{0xa, 0x4e20, 0xffffffffffff88d1, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x4}}]}, 0x410) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740400", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x1, &(0x7f0000000040)="7c3b7aeff4d5b946e9bb5fb71ea82b6314092532f6387f9989fed238541815d9e235bedc801fcc82dc1ee41148374e3e37ca9cda5367ff6e5c82235cf19fae7519ec7b33") ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d78, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 516.116882] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 516.124131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 516.131380] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000001 [ 516.225319] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x3) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r0, 0x0, 0x1}, 0x14) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) accept4$vsock_stream(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x80000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) sendmsg$inet_sctp(r2, &(0x7f0000000380)={&(0x7f00000001c0)=@in6={0xa, 0x4e23, 0x1, @empty, 0x9}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000240)="2913399342c6560c46cfd4bcc2ee984ec34c8a65668d2cb15ab4535d4e1e30d228dc02ddb86eb23a79d2b65466802c8ea66870f361ec3b7aa5637dad18279ce9c1d3a343e0dde286413c2b6662d9da060acd1ee304a55d6d681077ca1a96a4949bbf4f73559e09065ff2772411f1d5baf9569bfd7850bb44e75b9ced788e677a171b58687798120e0ad1f5d778fcde6fd973e81d0e39729cbb2cb2a8f578208da51e6f4e8de5127d8a9cb7f75e0f3fc3297cb58f1d7d94", 0xb7}, {&(0x7f0000002000)="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", 0x1000}], 0x2, 0x0, 0x0, 0x10}, 0x800) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x3, 0x9, 0x9, 0x5, 0x7f, 0x6}) 11:47:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x20100) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x3c, 0x1, 0x14, 0x1e, 0x4, 0x8, 0x4, 0xd3, 0x1}) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x801ff, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:41 executing program 2 (fault-call:7 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7400000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) socketpair$inet6(0xa, 0x3, 0x8, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000140)=@hci={0x0, 0x0}, 0x80, &(0x7f0000002480)=[{&(0x7f00000001c0)=""/108, 0x6c}, {&(0x7f0000000240)=""/28, 0x1c}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/201, 0xc9}], 0x6, &(0x7f0000002500)=""/126, 0x7e, 0x800}, 0x10000) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002580)={@remote={0xfe, 0x80, [], 0xbb}, 0x60, r2}) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000002640)={0x800, 0xa, 0x100}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) [ 516.327577] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000001100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x74000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x202, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x48000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 516.434889] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 516.466667] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174001100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 516.558587] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 516.578795] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 517.163831] FAULT_INJECTION: forcing a failure. [ 517.163831] name failslab, interval 1, probability 0, space 0, times 0 [ 517.175136] CPU: 0 PID: 29330 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 517.182491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.191835] Call Trace: [ 517.194428] dump_stack+0x1c9/0x2b4 [ 517.198058] ? dump_stack_print_info.cold.2+0x52/0x52 [ 517.203247] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 517.208101] should_fail.cold.4+0xa/0x1a [ 517.212165] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 517.217290] ? trace_hardirqs_on+0x10/0x10 [ 517.221532] ? print_usage_bug+0xc0/0xc0 [ 517.225621] ? find_held_lock+0x36/0x1c0 [ 517.229703] ? check_same_owner+0x340/0x340 [ 517.234027] ? rcu_note_context_switch+0x730/0x730 [ 517.238952] ? graph_lock+0x170/0x170 [ 517.242756] __should_failslab+0x124/0x180 [ 517.247006] should_failslab+0x9/0x14 [ 517.250811] kmem_cache_alloc+0x2af/0x760 [ 517.254966] ? trace_hardirqs_on+0x10/0x10 [ 517.259216] ? find_held_lock+0x36/0x1c0 [ 517.263289] get_empty_filp+0x12d/0x530 [ 517.267267] ? proc_nr_files+0x60/0x60 [ 517.271165] ? lock_downgrade+0x8f0/0x8f0 [ 517.275330] ? graph_lock+0x170/0x170 [ 517.279145] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 517.283992] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 517.288411] path_openat+0x11e/0x4e10 [ 517.292234] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 517.297252] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 517.302017] ? find_held_lock+0x36/0x1c0 [ 517.306101] ? lock_downgrade+0x8f0/0x8f0 [ 517.310274] ? kasan_check_read+0x11/0x20 [ 517.314429] ? do_raw_spin_unlock+0xa7/0x2f0 [ 517.318839] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 517.323426] ? __lock_is_held+0xb5/0x140 [ 517.327496] ? _raw_spin_unlock+0x22/0x30 [ 517.331641] ? __alloc_fd+0x34e/0x710 [ 517.335444] ? usercopy_warn+0x120/0x120 [ 517.339530] do_filp_open+0x255/0x380 [ 517.343337] ? may_open_dev+0x100/0x100 [ 517.347316] ? strncpy_from_user+0x3be/0x510 [ 517.351740] ? mpi_free.cold.1+0x19/0x19 [ 517.355814] ? get_unused_fd_flags+0x122/0x1a0 [ 517.360407] ? getname_flags+0x26e/0x5a0 [ 517.364476] do_sys_open+0x584/0x760 [ 517.368225] ? filp_open+0x80/0x80 [ 517.371770] ? syscall_slow_exit_work+0x500/0x500 [ 517.376617] ? ksys_ioctl+0x81/0xd0 [ 517.380247] __x64_sys_open+0x7e/0xc0 [ 517.384498] do_syscall_64+0x1b9/0x820 [ 517.388389] ? finish_task_switch+0x1d3/0x870 [ 517.392888] ? syscall_return_slowpath+0x5e0/0x5e0 [ 517.397820] ? syscall_return_slowpath+0x31d/0x5e0 [ 517.402754] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 517.408122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 517.412973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.418158] RIP: 0033:0x455a79 [ 517.421336] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.440756] RSP: 002b:00007feef069ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 517.448468] RAX: ffffffffffffffda RBX: 00007feef069b6d4 RCX: 0000000000455a79 [ 517.455731] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00000000200000c0 11:47:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x400}, 0x8) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x400, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 517.462989] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 517.470248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 517.477499] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000002 11:47:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/udplite\x00') ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000080)={'bridge0\x00', {0x2, 0x4e23, @rand_addr=0x10001}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000180)={0x12, 0x1, 0x6}, 0x1c) 11:47:42 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xedc0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) chmod(&(0x7f0000000040)='./file0\x00', 0x6c) 11:47:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000400", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="890b940e49db50735f1c7a47530fd7282a7d472319de92f5767824ae5cb49e192a042450e737b870e52b33190ed21bd0cae1857fba3f97e78a7a7db397b63813f40c3c52a91161caa946bf3934d0fe7879c344817dede450d1585acedbda334886611157eca175a44e4aebb262772b5dadf52d4ddec92159ee781010a977315a858d3bf38d9211e3daf0867843f75414342f2a464338cb10acfca7f127d6302513ca791498f09d1ea8a6555447dfd73836ad7a41a6e3000000"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:47:42 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x800000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 517.572602] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 517.651200] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:42 executing program 2 (fault-call:7 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x3) 11:47:42 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x778d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c670800000000000000b1fda08039ee2a876262da865016dc8068e1645072eeaded535d9b3205995a21173f", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x3}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e23, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x2}}}, 0x90) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617407fffffe00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x110) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:42 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20}, 0x3, 0x3, 0x3, 0x3}}, 0x2e) ioctl(r1, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) r3 = dup2(r1, r0) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000080)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x3ff) [ 517.799786] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 517.875921] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 518.590553] FAULT_INJECTION: forcing a failure. [ 518.590553] name failslab, interval 1, probability 0, space 0, times 0 [ 518.601842] CPU: 1 PID: 29394 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 518.609199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.618546] Call Trace: [ 518.621136] dump_stack+0x1c9/0x2b4 [ 518.624768] ? dump_stack_print_info.cold.2+0x52/0x52 [ 518.629983] should_fail.cold.4+0xa/0x1a [ 518.634051] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 518.639156] ? __lock_acquire+0x7fc/0x5020 [ 518.643390] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 518.647812] ? find_held_lock+0x36/0x1c0 [ 518.651904] ? check_same_owner+0x340/0x340 [ 518.656225] ? rcu_note_context_switch+0x730/0x730 [ 518.661161] ? find_held_lock+0x36/0x1c0 [ 518.665236] __should_failslab+0x124/0x180 [ 518.669480] should_failslab+0x9/0x14 [ 518.673295] kmem_cache_alloc_trace+0x2cb/0x780 [ 518.677975] ? graph_lock+0x170/0x170 [ 518.681789] fuse_file_alloc+0xb2/0x3a0 [ 518.685765] ? fuse_writepage_end+0x610/0x610 [ 518.690259] ? find_held_lock+0x36/0x1c0 [ 518.694324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.699863] ? fsnotify+0xbb4/0x14e0 [ 518.703584] fuse_do_open+0xa9/0x540 [ 518.707297] ? fsnotify_first_mark+0x350/0x350 [ 518.711877] ? fuse_file_alloc+0x3a0/0x3a0 [ 518.716109] ? fsnotify+0x14e0/0x14e0 [ 518.719908] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 518.724506] fuse_open_common+0x160/0x2b0 [ 518.728669] fuse_dir_open+0x22/0x30 [ 518.732396] do_dentry_open+0x818/0xe40 [ 518.736375] ? security_inode_permission+0xd2/0x100 11:47:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee01, 0x0, 0xee00, 0xee00]) r4 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000980)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f00000007c0)='syzkaller\x00', &(0x7f0000000800)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000840)="6ae5dfa5f7866c23a4ca35a046617721bc3d6738e400e2a0bcea315a7e59bf7fafce99d583cbfb0b1140a0f2eeb3ae2cd31e008ae41158f3338b7e254bc19f253f00b8c884325bb5d4a40c6570d0d86d10b21b77e9de18ff7cb69818a9f35d45b589142679a2b924f15be2233f092c6419b75ce38b08262fbf9fdd8890e38a96058d91fcf34446b93e2b4c4ca299506d9200d9d091f7bb6a25d8adc4feb8ee83b003d93e45f4a63ba2558aad2dbfa67dfe28df083cd86045bc865fbdb55b158c4f90d40c73b2a78b0d81c4e3e7564c9fa2957265792afe5fe54742a88f29", 0xde, r4) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='fuse\x00', 0x2108010, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r2, @ANYBLOB='oHisup_id=', @ANYRESDEC=r3, @ANYBLOB=',blksize=0x0000000000001000,default_permissions,max_read=0x0000000000008001,max_read=0x0000000000000041,max_read=0x0000000000000001,\x00']) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dsp\x00', 0x10001, 0x0) setsockopt$packet_int(r5, 0x107, 0x10, &(0x7f0000000780)=0x2e7e5bd4, 0x4) r6 = open$dir(&(0x7f0000000a00)='./file0\x00', 0x80000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) fgetxattr(r6, &(0x7f00000002c0)=@random={'user.', '\x00'}, &(0x7f0000000700)=""/47, 0x2f) r7 = openat(r6, &(0x7f0000000340)='./file0/file0\x00', 0x20000, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e21, 0x7, @loopback={0x0, 0x1}, 0xc55500}}, 0x4, 0xfffffffffffffff9}, &(0x7f0000000380)=0x90) setsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f00000003c0)=@assoc_value={r8, 0x7}, 0x8) write$FUSE_OPEN(r7, &(0x7f0000000040)={0x20, 0x200000, 0x4}, 0x20) 11:47:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:43 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x500000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00 \x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 11:47:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0) 11:47:43 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x68000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 518.741404] ? fuse_dir_release+0x20/0x20 [ 518.745565] vfs_open+0x139/0x230 [ 518.749025] path_openat+0x174a/0x4e10 [ 518.752944] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 518.757717] ? find_held_lock+0x36/0x1c0 [ 518.761795] ? lock_downgrade+0x8f0/0x8f0 [ 518.765944] ? do_sys_open+0x3a2/0x760 [ 518.769847] ? kasan_check_read+0x11/0x20 [ 518.773999] ? do_raw_spin_unlock+0xa7/0x2f0 [ 518.778407] ? __lock_is_held+0xb5/0x140 [ 518.782479] ? _raw_spin_unlock+0x22/0x30 [ 518.786622] ? __alloc_fd+0x34e/0x710 [ 518.790425] ? usercopy_warn+0x120/0x120 [ 518.794505] do_filp_open+0x255/0x380 [ 518.798311] ? may_open_dev+0x100/0x100 [ 518.802291] ? strncpy_from_user+0x3be/0x510 [ 518.806712] ? mpi_free.cold.1+0x19/0x19 [ 518.810779] ? get_unused_fd_flags+0x122/0x1a0 [ 518.815367] ? getname_flags+0x26e/0x5a0 [ 518.819435] do_sys_open+0x584/0x760 [ 518.823147] ? filp_open+0x80/0x80 [ 518.826681] ? syscall_slow_exit_work+0x500/0x500 [ 518.831513] ? ksys_ioctl+0x81/0xd0 [ 518.835131] __x64_sys_open+0x7e/0xc0 [ 518.838922] do_syscall_64+0x1b9/0x820 [ 518.842796] ? finish_task_switch+0x1d3/0x870 [ 518.847278] ? syscall_return_slowpath+0x5e0/0x5e0 [ 518.852196] ? syscall_return_slowpath+0x31d/0x5e0 [ 518.857117] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 518.862475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 518.867314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.872489] RIP: 0033:0x455a79 [ 518.875662] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.895004] RSP: 002b:00007feef069ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 518.902709] RAX: ffffffffffffffda RBX: 00007feef069b6d4 RCX: 0000000000455a79 [ 518.909968] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00000000200000c0 [ 518.917220] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 518.924480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 518.931733] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000003 11:47:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0060d6d92e4b5b0d62dd8b77dca9d87293f4ff4643f27a06a9e2ce73493cb08bcd80363c439c0c1e0c95028905ca8ff8685cdb6fd09fee06c0269114f7ac3bba443075af580a30c76c79522a1f33acdb66d64a34fb"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7f, 0x101002) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x7}}, 0x0, 0x5, 0x2, 0xfffffffffffff628, 0xfffffffffffffffd}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r2, 0x80000000}, 0x8) write$FUSE_INIT(r0, &(0x7f0000000100)={0xffffffffffffff32, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000340)={0x18, 0x1, 0x0, {0xd69f}}, 0x18) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) clock_getres(0x4, &(0x7f0000000380)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 518.988913] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 519.027348] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:44 executing program 2 (fault-call:7 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = socket$inet(0x2, 0x7, 0x6) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r2, 0x9, 0x81}, &(0x7f0000000100)=0xc) ioctl(r0, 0x890e, &(0x7f0000000480)="da09c204e53d0cf872acb52a330cd8ea9751940957b7204da510f2a7fe5d3c9e9ce29eecadebb0899296c9061a30470aaeba355a610aa80cf8ba872770c34ce5d3625fecb0decc366fcdd8c8ce7b7c100d02ba40258cd5715e46cd40636e2a2a27ac8326d7f74747f00fd09706123e96e824392acf56bf8ac7573753674119f3cf84017e55f87e998b79799d58ac8cc00a73c5196cc5cbb55af17dea25db46de7023d1792c295cd54efb240c251af37d5ea5582d0f0c0dea971a444352d3181332452401e98ec5") r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r3, 0x402c542c, &(0x7f0000000000)) 11:47:44 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000180)={0x3, 0x7ff, 0xaa, 0x4, 0x400}) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:44 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x700, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:44 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x10000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 519.267896] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200004, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x7ff, 0x4) r2 = dup(r1) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000240)=""/214) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='maps\x00') write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18, 0x0, 0x2, {0x3}}, 0xffffffffffffff69) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000180)={0x90, 0x8000, 0x5, 0x7, 0x0}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r4, 0x2, 0x8}, 0x8) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f0000000140)=""/55) [ 519.349502] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 520.065629] FAULT_INJECTION: forcing a failure. [ 520.065629] name failslab, interval 1, probability 0, space 0, times 0 [ 520.076936] CPU: 1 PID: 29465 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 520.084289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.093635] Call Trace: [ 520.096222] dump_stack+0x1c9/0x2b4 [ 520.099857] ? dump_stack_print_info.cold.2+0x52/0x52 [ 520.105047] ? __kernel_text_address+0xd/0x40 [ 520.109548] should_fail.cold.4+0xa/0x1a [ 520.113610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 520.118713] ? save_stack+0xa9/0xd0 [ 520.122339] ? save_stack+0x43/0xd0 [ 520.125962] ? kasan_kmalloc+0xc4/0xe0 [ 520.129854] ? kmem_cache_alloc_trace+0x152/0x780 [ 520.134707] ? fuse_file_alloc+0xb2/0x3a0 [ 520.138867] ? fuse_do_open+0xa9/0x540 [ 520.142751] ? fuse_open_common+0x160/0x2b0 [ 520.147078] ? find_held_lock+0x36/0x1c0 [ 520.151161] ? check_same_owner+0x340/0x340 [ 520.155482] ? rcu_note_context_switch+0x730/0x730 [ 520.160413] ? kasan_check_read+0x11/0x20 [ 520.164569] __should_failslab+0x124/0x180 [ 520.168822] should_failslab+0x9/0x14 [ 520.172634] kmem_cache_alloc+0x2af/0x760 [ 520.176782] ? fuse_file_alloc+0xb2/0x3a0 [ 520.180930] ? rcu_read_lock_sched_held+0x108/0x120 [ 520.185946] ? kmem_cache_alloc_trace+0x616/0x780 [ 520.190792] __fuse_request_alloc+0x27/0xf0 [ 520.195135] fuse_request_alloc+0x18/0x20 [ 520.199289] fuse_file_alloc+0xe8/0x3a0 [ 520.203262] ? fuse_writepage_end+0x610/0x610 [ 520.207752] ? find_held_lock+0x36/0x1c0 [ 520.211813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.217344] ? fsnotify+0xbb4/0x14e0 [ 520.221056] fuse_do_open+0xa9/0x540 [ 520.224759] ? fsnotify_first_mark+0x350/0x350 [ 520.229331] ? fuse_file_alloc+0x3a0/0x3a0 [ 520.233549] ? fsnotify+0x14e0/0x14e0 [ 520.237338] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 520.241914] fuse_open_common+0x160/0x2b0 [ 520.246055] fuse_dir_open+0x22/0x30 [ 520.249757] do_dentry_open+0x818/0xe40 [ 520.253716] ? security_inode_permission+0xd2/0x100 [ 520.258717] ? fuse_dir_release+0x20/0x20 [ 520.262859] vfs_open+0x139/0x230 [ 520.266306] path_openat+0x174a/0x4e10 [ 520.270195] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 520.274944] ? find_held_lock+0x36/0x1c0 [ 520.279006] ? lock_downgrade+0x8f0/0x8f0 [ 520.283146] ? do_sys_open+0x3a2/0x760 [ 520.287034] ? kasan_check_read+0x11/0x20 [ 520.291170] ? do_raw_spin_unlock+0xa7/0x2f0 [ 520.295568] ? __lock_is_held+0xb5/0x140 [ 520.299625] ? _raw_spin_unlock+0x22/0x30 [ 520.303756] ? __alloc_fd+0x34e/0x710 [ 520.307540] ? usercopy_warn+0x120/0x120 [ 520.311597] do_filp_open+0x255/0x380 [ 520.315396] ? may_open_dev+0x100/0x100 [ 520.319357] ? strncpy_from_user+0x3be/0x510 [ 520.323756] ? mpi_free.cold.1+0x19/0x19 [ 520.327805] ? get_unused_fd_flags+0x122/0x1a0 [ 520.332380] ? getname_flags+0x26e/0x5a0 [ 520.336432] do_sys_open+0x584/0x760 [ 520.340137] ? filp_open+0x80/0x80 [ 520.343666] ? syscall_slow_exit_work+0x500/0x500 [ 520.348507] ? ksys_ioctl+0x81/0xd0 [ 520.352124] __x64_sys_open+0x7e/0xc0 [ 520.355913] do_syscall_64+0x1b9/0x820 [ 520.359787] ? finish_task_switch+0x1d3/0x870 [ 520.364272] ? syscall_return_slowpath+0x5e0/0x5e0 [ 520.369189] ? syscall_return_slowpath+0x31d/0x5e0 [ 520.374112] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 520.379474] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 520.384311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.389486] RIP: 0033:0x455a79 [ 520.392655] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.411997] RSP: 002b:00007feef069ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 520.419699] RAX: ffffffffffffffda RBX: 00007feef069b6d4 RCX: 0000000000455a79 [ 520.426952] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00000000200000c0 [ 520.434205] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 520.441461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 520.448713] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000004 11:47:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff) timerfd_create(0x5, 0x80800) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) init_module(&(0x7f0000000000)='cpuset\x00', 0x7, &(0x7f0000000080)='\x00') openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) read$FUSE(r0, &(0x7f0000002000), 0x1000) 11:47:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:45 executing program 3: r0 = socket$inet6(0xa, 0x806, 0x7) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:47:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x4db) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 520.544786] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4c000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c06"]) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x8000, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) [ 520.597860] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:45 executing program 2 (fault-call:7 fault-nth:5): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) rt_sigprocmask(0x2, &(0x7f0000000040)={0x2}, &(0x7f0000000080), 0x8) 11:47:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000001100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xa00000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f90705f00643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$peek(0x2, r1, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffff9c) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000640)=""/203) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000540)=""/200) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000003000), 0x1000) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x798d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 520.756861] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 520.787862] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400001100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xfeffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x2, 0x8}) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xe4ffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 520.942350] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 521.004413] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) [ 521.574173] FAULT_INJECTION: forcing a failure. [ 521.574173] name failslab, interval 1, probability 0, space 0, times 0 [ 521.585422] CPU: 1 PID: 29547 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #143 [ 521.592780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.602126] Call Trace: [ 521.604713] dump_stack+0x1c9/0x2b4 [ 521.608331] ? dump_stack_print_info.cold.2+0x52/0x52 [ 521.613514] should_fail.cold.4+0xa/0x1a [ 521.617562] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 521.622648] ? __lock_acquire+0x7fc/0x5020 [ 521.626866] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 521.631261] ? kasan_check_read+0x11/0x20 [ 521.635404] ? find_held_lock+0x36/0x1c0 [ 521.639461] ? check_same_owner+0x340/0x340 [ 521.643763] ? kasan_kmalloc+0xc4/0xe0 [ 521.647633] ? kasan_slab_alloc+0x12/0x20 [ 521.651764] ? kmem_cache_alloc+0x12e/0x760 [ 521.656068] ? rcu_note_context_switch+0x730/0x730 [ 521.660982] ? fuse_do_open+0xa9/0x540 [ 521.664852] ? fuse_open_common+0x160/0x2b0 [ 521.669162] __should_failslab+0x124/0x180 [ 521.673387] should_failslab+0x9/0x14 [ 521.677173] kmem_cache_alloc+0x2af/0x760 [ 521.681306] ? graph_lock+0x170/0x170 [ 521.685095] __fuse_request_alloc+0x27/0xf0 [ 521.689403] __fuse_get_req+0x1f8/0xa20 [ 521.693362] ? find_held_lock+0x36/0x1c0 [ 521.697408] ? fuse_put_request+0x360/0x360 [ 521.701721] ? lock_downgrade+0x8f0/0x8f0 [ 521.705852] ? __lockdep_init_map+0x105/0x590 [ 521.710437] fuse_simple_request+0x28/0x730 [ 521.714746] fuse_send_open.isra.17+0x366/0x450 [ 521.719401] ? fuse_file_read_iter+0x250/0x250 [ 521.723970] ? _raw_spin_unlock+0x22/0x30 [ 521.728101] ? fuse_file_alloc+0x298/0x3a0 [ 521.732330] ? fsnotify+0xbb4/0x14e0 [ 521.736038] fuse_do_open+0x25c/0x540 [ 521.739824] ? fuse_file_alloc+0x3a0/0x3a0 [ 521.744042] ? fsnotify+0x14e0/0x14e0 [ 521.747829] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 521.752400] fuse_open_common+0x160/0x2b0 [ 521.756542] fuse_dir_open+0x22/0x30 [ 521.760241] do_dentry_open+0x818/0xe40 [ 521.764199] ? security_inode_permission+0xd2/0x100 [ 521.769201] ? fuse_dir_release+0x20/0x20 [ 521.773344] vfs_open+0x139/0x230 [ 521.776782] path_openat+0x174a/0x4e10 [ 521.780662] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 521.785401] ? find_held_lock+0x36/0x1c0 [ 521.789454] ? lock_downgrade+0x8f0/0x8f0 [ 521.793580] ? do_sys_open+0x3a2/0x760 [ 521.797456] ? kasan_check_read+0x11/0x20 [ 521.801586] ? do_raw_spin_unlock+0xa7/0x2f0 [ 521.805977] ? __lock_is_held+0xb5/0x140 [ 521.810032] ? _raw_spin_unlock+0x22/0x30 [ 521.814161] ? __alloc_fd+0x34e/0x710 [ 521.817944] ? usercopy_warn+0x120/0x120 [ 521.821993] do_filp_open+0x255/0x380 [ 521.825780] ? may_open_dev+0x100/0x100 [ 521.829737] ? strncpy_from_user+0x3be/0x510 [ 521.834131] ? mpi_free.cold.1+0x19/0x19 [ 521.838176] ? get_unused_fd_flags+0x122/0x1a0 [ 521.842745] ? getname_flags+0x26e/0x5a0 [ 521.846793] do_sys_open+0x584/0x760 [ 521.850500] ? filp_open+0x80/0x80 [ 521.854029] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 521.859551] ? ksys_ioctl+0x81/0xd0 [ 521.863162] __x64_sys_open+0x7e/0xc0 [ 521.867038] do_syscall_64+0x1b9/0x820 [ 521.870908] ? finish_task_switch+0x1d3/0x870 [ 521.875390] ? syscall_return_slowpath+0x5e0/0x5e0 [ 521.880305] ? syscall_return_slowpath+0x31d/0x5e0 [ 521.885229] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 521.890581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 521.895409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.900583] RIP: 0033:0x455a79 [ 521.903752] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:47:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303012303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = dup3(r0, r0, 0x80000) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0xff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x4, 0x0) setns(r1, 0x60000000) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x795) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 521.922976] RSP: 002b:00007feef069ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 521.930667] RAX: ffffffffffffffda RBX: 00007feef069b6d4 RCX: 0000000000455a79 [ 521.937917] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00000000200000c0 [ 521.945169] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 521.952418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 521.959668] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000005 11:47:47 executing program 2 (fault-call:7 fault-nth:6): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x10, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000300", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0xc913, &(0x7f00000004c0)="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") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3ffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x880) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x400000, 0x0) syz_open_pts(r3, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x6}}, 0x20) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000100)=""/54) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x2, 0x6, "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", 0x1c, 0x0, 0x4, 0x813, 0x1, 0xffffffff, 0x3f, 0x1}, r4}}, 0x128) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0xfffffea5, 0x1, 0x800000000005, {0x7, 0x1b, 0x4, 0x100000, 0x6, 0xfffffffffffffffe, 0x0, 0x53b}}, 0xffffffffffffff4b) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x24a081) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 522.175624] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 522.205371] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x3, 0x442000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffff5, 0x6}, 0x10) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d75, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 11:47:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) 11:47:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="00000100000000eeff0800") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x20001, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6400, &(0x7f0000000280)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}, 0x2c}]}}) [ 522.360445] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:47:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x1000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000300", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 522.414782] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 522.500827] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 522.537331] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c01d1c6f79dda44c73e57434e810c10c3534e512d9983ca3d03c6d7cfc673c878a644502bae1bb25cf46c670000a1e925f2a36fb978cefa2af8bae993030bc04c840796b4ac0e7577f45c730752efbd0b85bd29a6450943a54bcc965f7f799a89622b558d285f8799de12f96a4a4da59fb1dc93b024207303baeae7cabc71f465649c61f05bfc0343ed9d360e39"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1d, &(0x7f0000000280)=0x1, 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) r3 = openat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x2) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000180)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x482, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0x6, 0x401, 0x20, 0xff, 0x8, 0x9}}, 0xa) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:48 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x808d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174008800", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 523.213349] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67023d84ba0c69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 523.272784] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:48 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00000000006bed427ed6007f0000000000851a52df873057ff858a454954007124a6fc436a7259adb2455dca924a151ca1ed40781d5461feade428fdd77671d4ad0dae063e1172e1e615d82b0407d353e9eba01163e0d05e69b48d2839cc12c459e08ee5489ee56dde38b22695d40ef66d3f65219bbfa06583eb0720596009e802a24040702272248ff38b65ec4ebbb7162bd09771668f59d005430abd289e3288ca83a6bfd2d695e56089ff55ddcd518866f0c71c87e5cbe57076051364ee693ea5df436b702a0e0161e9ac2cc7adbdce7de0174be2f6746fae37d950762c91aa7bf53f388a14d79d3b5a52f3a5bf1fa7646c04bb7e178a49b32674", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x2b) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000004000), 0x1028) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = open(&(0x7f0000000240)='./file0\x00', 0x400002, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000001c0)={0x21, 0x3}, 0x21) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x400, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000140)={0x7, 0x800}) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000100)) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e21, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, {0xa, 0x4e24, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, 0x0, [0xaecb, 0xcf9, 0x7fffffff, 0x3, 0x742, 0x7f, 0x200, 0x100000001]}, 0x5c) 11:47:48 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7d8d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="c3a7"]) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x401) getsockname$netlink(r1, &(0x7f00000001c0), &(0x7f0000000280)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x1fffe, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174001100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:48 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7d8d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='f\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d3802b503ea91763abe23b507780cf200de", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2a61ac7408000000000000002c00f85e2646859bce1a056e0603c3f1fa6c4e287ddf99f07544536c2a8127b2df85d5c54bc5fa8f516f2b3274719c6d43ab91297f734cfbb20f2a33c4ed46f608d49fea908a7bdb0af395f14bfc82a340f6351df343cf0d0463548b42b915f68efef4d15849890973f40371c7439c489e1102cf11b7bf63d47a7a7b415c45b893d08f4d9cd579b0e01383c35853dfa2712b17b2765b11f62a58413788faafc16faad795187d9456644d8d6a3f8be483cabdbf386458b294"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 523.481988] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f6964c4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000003000), 0xffffffffffffffcb) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x1008, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000340)=0xe8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x90040, 0x0) r5 = getgid() r6 = getpgid(0x0) r7 = getpgid(0x0) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000380)={{0x0, r2, r3, r4, r5, 0x80, 0x7}, 0x1200000, 0x1, 0xffffffffffffffff, 0x4, r6, r7, 0x2}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x1, 0x2000) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f00000004c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0741d7ba6c9663a4dcebdc4ee5e1c30ad5fa7c725d560696286fd3e37dda4a5d20ae6f0b6cb6242996c10726528cbe9b4f4b1223bcbfc0af42168a6dc6292aa681e51d4eecc9f5a00e61a1cb08418a48f20dfe517abab9f8d966160dfec1f1345ebac8ddff6c8ed25ce4a6ab1a88be4329082982aa9540c2929daa27e0fdcadcd223fbfd81426310f5e4a74cff8e216b244cd52cda1b65dcf45277720d3ca6320dccbed18b834a1000b9ab2322d7095e425f372c339148b86c92e1e29080c8ccc46d2775100d25a9749e97ee3e5454b3319a9cc5052d7367dc9c76e896e06d764a9b423927eec70caa930fd35d2822573696fb"]) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x100000000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32=r4, @ANYBLOB="f9000000751618adde85bba79deb2dff06119e2a8a8e7c6826b6236a0598130971e338f774db3d701cad0ed2f5cec86512cb1a19b2f655547d99d2dfdf3c79e70f8a35359cc334eea05d51fc9b70a95b50444c3edc40ecfd9753d0d57f3f19ffaf9aaabd11d60c925003c3e78ec20a30bdd78b7c50c642995c50888a147d01397a0e53a3679d0670128fca3e38ffe9e42d7d421106509a18163f8166d182cfcb34e5302139bc927e3959fe547904955ebfede8ec210fbaeae36c3a6ed19842bc9d4284d77b6658896f43bb95886017c434c1fc580a786bd26c1560ee15727a30f88fca7bc4f167b4b3a9ffbdab8695cb259e1d52bf8b5b8c1a8a423b20f8156f64b8c69c8d14d7e0ead29de867aba4e59e058b9e76e9706fd91895adf680d8f9178dd18e5032a33d363d30a973ee5dd3ebfa48c3139517ee3b47ab53bc7ec04e9bbba8ad10b34c52e2aa45e8ceab7043be41d3664bc81ad6d42bee1525794fa98dfc31e5de3afe588c58e48268e37e34b5e55b39f7"], &(0x7f0000000240)=0x101) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 523.534599] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000400", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000340)=""/96) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80200, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000240)={{0x0, 0x0, 0x2, 0x100000001, 0x2, 0x9}, 0x0, 0x6, 0x7, 0x15, 0x401, "25947ec9f326a53264d4d34c652df06b999b795427dbf4e432e9c86017e76c37005b1456048cf374652f632cfa52239e87d58292ce0658d6682305d0806d1102a3320bdfb005c780eaccbe5d700b813f995e424d4b6a65e8413ce1fa4c1e4f65d0a1427edfa4cce80dce113c501348850d5136d7d6d8c4e994b73c352e616c07"}) read$FUSE(r1, &(0x7f0000001000), 0x1000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000180)={0x1, 0x6c13, 0x0, 0x100}) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0xffffffffffffffda, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:48 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x600000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) prlimit64(r2, 0xf, &(0x7f0000000080)={0x400, 0xda}, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 523.665613] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 523.735279] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x80000, 0x0) mq_timedreceive(r1, &(0x7f00000003c0)=""/106, 0x6a, 0x5, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x100000000, 0x6, 0x200000, 0x5, 0x2ab2, 0x236eff64, 0x69bc, {0x0, @in6={{0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x2}}, 0x7f, 0x0, 0xfffffffffffffff8, 0x4, 0x2}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r2, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={r2, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}, [0xffffffffffff98c7, 0x2, 0x2, 0x0, 0x7, 0x1, 0x9, 0x8, 0x274e, 0x0, 0x2, 0x9, 0x1a0, 0x8000, 0xffffffffffffc7a2]}, &(0x7f0000000140)=0x100) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000480)={@remote, @local}, &(0x7f00000004c0)=0xc) ioctl$VT_RESIZE(r3, 0x402c542c, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000500)={{0x100000000, 0x800100}, {0x81, 0x4}, 0x0, 0x2, 0x8}) 11:47:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',Group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:49 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x400000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x400c, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:49 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x29, 0x33, 0x4, 0x10, 0x4, 0x20, 0x1, 0xfe, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1000000000001, 0x20) ioctl(r1, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, '.%'}, {0x20, '/dev/ptmx\x00'}], 0xa, "7b7058076773182202192b57a2f7853496a100cdfaabf108c931c3dca0a66f4736ad264c062fcae50d8f3963d99d569c5aa98fe02b9a9cb1a647b70cb9ac92f6d03a93356ac025e8a00bb5ee600c019e6cafd06bae14b8a3a58ba4d40546180f949ccaecceb961966f9c027c69cbb7c579494486eaec0c5f6215b0ad7898a013a45bf49555ac44929698d6d02ff7799860f3ad04c9a6e514f834a0b2849ad4a865924d869f1cd2601df2a5cbd9d6045194aea43849fffdc3ebd39dab674aa6691b15b9"}, 0xdc) lookup_dcookie(0x3, &(0x7f0000000240)=""/246, 0xf6) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x103000) [ 524.459491] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:49 executing program 4 (fault-call:2 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:49 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d7f, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB="6fa9194fc0351428599a14ff8dada431d670a0266253440f787ce700ca629bcc01b9f4", @ANYBLOB=',gr+ZXup_i', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x400) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000180)={0x6, 0x1, 0x20, 0x100000000, '\x00', 0x5a}) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x3, 0x0, 0x3}, 0xb) [ 524.516443] QAT: Invalid ioctl 11:47:49 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xedc000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 524.544793] FAULT_INJECTION: forcing a failure. [ 524.544793] name failslab, interval 1, probability 0, space 0, times 0 [ 524.556102] CPU: 0 PID: 29711 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 524.563470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.572825] Call Trace: [ 524.575423] dump_stack+0x1c9/0x2b4 [ 524.579068] ? dump_stack_print_info.cold.2+0x52/0x52 [ 524.584297] ? lock_downgrade+0x8f0/0x8f0 [ 524.588470] should_fail.cold.4+0xa/0x1a 11:47:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 524.592547] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 524.597670] ? lock_downgrade+0x8f0/0x8f0 [ 524.601833] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 524.607381] ? proc_fail_nth_write+0x9e/0x210 [ 524.611893] ? find_held_lock+0x36/0x1c0 [ 524.615991] ? check_same_owner+0x340/0x340 [ 524.620324] ? __lock_is_held+0xb5/0x140 [ 524.624397] ? rcu_note_context_switch+0x730/0x730 [ 524.629341] __should_failslab+0x124/0x180 [ 524.633587] should_failslab+0x9/0x14 [ 524.637396] __kmalloc_track_caller+0x2c4/0x760 [ 524.642079] ? strncpy_from_user+0x510/0x510 [ 524.646493] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 524.652040] ? strndup_user+0x77/0xd0 [ 524.655860] memdup_user+0x2c/0xa0 [ 524.659407] strndup_user+0x77/0xd0 [ 524.663042] ksys_mount+0x3c/0x140 [ 524.666588] __x64_sys_mount+0xbe/0x150 [ 524.670570] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 524.675590] do_syscall_64+0x1b9/0x820 [ 524.679482] ? finish_task_switch+0x1d3/0x870 [ 524.683988] ? syscall_return_slowpath+0x5e0/0x5e0 [ 524.688926] ? syscall_return_slowpath+0x31d/0x5e0 [ 524.693869] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 524.694599] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 524.699243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 524.699273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.699286] RIP: 0033:0x455a79 [ 524.699290] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.740981] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 524.748692] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 524.755962] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 524.763229] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 524.770492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 524.777756] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000000 [ 524.803631] QAT: Invalid ioctl 11:47:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="e664be8b97b5dc412fab6b40096664e1beb0ee97715d7b411fecb76d3d8d544cc81aab78b7f5d7536978e02d7f4f3d50e2c677ec40096fe32a6728b1e63e2bed693483296d4f9e63e59e15b307e8f1416d0ae84bc1548087a5b6175e9ec7dcd764fe7371acbf74ee96fc9208efcdfc59523be7d47a9b90312636a0959bef3bc46034fd7bac", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:49 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x40000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00 \x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:49 executing program 4 (fault-call:2 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x2, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 524.958856] FAULT_INJECTION: forcing a failure. [ 524.958856] name failslab, interval 1, probability 0, space 0, times 0 [ 524.970132] CPU: 1 PID: 29740 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 524.977490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.986838] Call Trace: [ 524.989439] dump_stack+0x1c9/0x2b4 [ 524.993080] ? dump_stack_print_info.cold.2+0x52/0x52 [ 524.998286] should_fail.cold.4+0xa/0x1a [ 525.002352] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 525.007465] ? kasan_kmalloc+0xc4/0xe0 [ 525.011353] ? __kmalloc_track_caller+0x14a/0x760 [ 525.016195] ? memdup_user+0x2c/0xa0 [ 525.019907] ? strndup_user+0x77/0xd0 [ 525.023721] ? graph_lock+0x170/0x170 [ 525.027530] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 525.033075] ? proc_fail_nth_write+0x9e/0x210 [ 525.037580] ? find_held_lock+0x36/0x1c0 [ 525.041663] ? check_same_owner+0x340/0x340 [ 525.045985] ? lock_release+0xa30/0xa30 [ 525.049960] ? check_same_owner+0x340/0x340 [ 525.054283] ? rcu_note_context_switch+0x730/0x730 [ 525.059217] ? __check_object_size+0x9d/0x5f2 [ 525.063722] __should_failslab+0x124/0x180 [ 525.067962] should_failslab+0x9/0x14 [ 525.071771] kmem_cache_alloc_trace+0x2cb/0x780 [ 525.076451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.081993] ? _copy_from_user+0xdf/0x150 [ 525.086146] copy_mount_options+0x5f/0x380 [ 525.090388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.095929] ksys_mount+0xd0/0x140 [ 525.099478] __x64_sys_mount+0xbe/0x150 [ 525.103461] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 525.108482] do_syscall_64+0x1b9/0x820 [ 525.112369] ? finish_task_switch+0x1d3/0x870 [ 525.116867] ? syscall_return_slowpath+0x5e0/0x5e0 [ 525.121801] ? syscall_return_slowpath+0x31d/0x5e0 [ 525.126740] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 525.132115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 525.136969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.142152] RIP: 0033:0x455a79 11:47:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x9, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 525.145332] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.164711] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 525.172425] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 525.179693] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 525.186958] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 525.194226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 525.201489] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000001 [ 525.217203] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 525.268950] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = geteuid() setresuid(r3, r3, r3) r4 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={r2, r3, r4}, 0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8913, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:50 executing program 4 (fault-call:2 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="16f7"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000400", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x1f00000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x100000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x1c400) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x400) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x4, 0x8, 0x7, 0x7, 0x0, 0x5, 0x2600, 0x1, 0x2, 0x7fff, 0x100000001, 0x100000000, 0x100000000, 0x3, 0x8, 0x8, 0x0, 0x2, 0x0, 0x100, 0x4, 0xfffffffffffffffa, 0x9, 0x7, 0x0, 0x100000000, 0x7f, 0xffffffffffffff3b, 0x0, 0x20, 0x4, 0xa4, 0x6, 0x100000001, 0x4917, 0x9, 0x0, 0x9, 0x2, @perf_config_ext={0x1, 0x2}, 0x1500, 0x18, 0x9, 0x0, 0x8000, 0xcc, 0x100000001}, r1, 0xf, r2, 0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 525.560598] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c2f726f75705f69643dc9df317e778b5e0d360e9cbf2c1b3643153d0534b13a7908daf2745e316c98d22c625198545f228153564b61597e130509a8023b88740c3b474e5e74a48563e6db4a1b8d4f5425f271fff6b928cf205190d95e89ad01ac86f94f8421d677a4d22b05e770eb3617410bcf433d36fb956b367a2ae52a0ef88aecc981e0c63269c3f9178713fd2acdae62b359b578", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x86) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x2, {0xffffffffffffffff}}, 0x18) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x7fff, &(0x7f0000000080)="0e762949516ea155680dbd16da926783910be3f079467950aa19ff5526576601c1a2d0f127a651ac930320beea606f18b027768ef0b36a000200005ce856d0b7c73604ab8db8381172768db1d6411b1bb16ffb4b27febb36000000") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x600000, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000280)=0x14) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80) r4 = mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1a1013, r3, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000180)={r4}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x200, 0x0) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000540)={0x9, 0x81, 0x0, 0x4, 0x100, 0x2, 0x40, 0x2a, 0x8, 0x3ff, 0x0, 0x66}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@loopback={0x0, 0x1}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e22, 0xffffffff, 0x4e20, 0x0, 0x2, 0x0, 0x80, 0x2c, r2, r6}, {0x8, 0x1, 0xf8, 0x1, 0x2, 0x800, 0xe290, 0x1}, {0x4b, 0x7, 0x8, 0x40}, 0x3, 0x6e6bba, 0x0, 0x0, 0x3}, {{@in=@rand_addr=0xa45e, 0x4d4, 0x6c}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x0, 0x5, 0x3, 0x8, 0x80000001, 0x5, 0x6}}, 0xe8) ioctl$VT_RESIZE(r5, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x3ff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) 11:47:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x5000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = getegid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r2) r3 = fcntl$getown(r0, 0x9) ptrace$peek(0xffffffffffffffff, r3, &(0x7f0000000140)) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x470, 0x160, 0x160, 0x280, 0x0, 0x0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x9, 0x1, 0x1, [0x6, 0x1ff, 0x80000000, 0x100000001, 0x8, 0xa12a, 0x2, 0x9, 0x2, 0x4c4978dc, 0x1, 0x10001, 0x4, 0x3, 0x2, 0x7], 0x3}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x8, 0x3, 0xfff}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@inet=@esp={0x30, 'esp\x00', 0x0, {0x4d2, 0x4d3, 0x1}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x4}}}, {{@uncond, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x8, 0x1, 0x31b1000000000}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7ff, 0x800, 0x0, 0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x10) ioctl$VT_RESIZE(r4, 0x402c542c, &(0x7f0000000000)={0x40000000000}) [ 525.665943] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000300", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xfffffffffffffffd) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 525.787545] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 525.810458] FAULT_INJECTION: forcing a failure. [ 525.810458] name failslab, interval 1, probability 0, space 0, times 0 [ 525.821724] CPU: 0 PID: 29795 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 525.829080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.838423] Call Trace: [ 525.841014] dump_stack+0x1c9/0x2b4 [ 525.844644] ? dump_stack_print_info.cold.2+0x52/0x52 [ 525.849836] ? find_held_lock+0x36/0x1c0 [ 525.853911] should_fail.cold.4+0xa/0x1a [ 525.857986] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 525.863102] ? kasan_check_read+0x11/0x20 [ 525.863315] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 525.867254] ? rcu_is_watching+0x8c/0x150 [ 525.867272] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 525.867288] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 525.867310] ? find_held_lock+0x36/0x1c0 [ 525.867341] ? check_same_owner+0x340/0x340 [ 525.867359] ? rcu_note_context_switch+0x730/0x730 [ 525.902724] ? save_stack+0xa9/0xd0 [ 525.906360] __should_failslab+0x124/0x180 [ 525.910600] should_failslab+0x9/0x14 [ 525.914402] kmem_cache_alloc+0x2af/0x760 [ 525.918566] getname_flags+0xd0/0x5a0 [ 525.922371] user_path_at_empty+0x2d/0x50 [ 525.926520] do_mount+0x17a/0x30e0 [ 525.930066] ? copy_mount_string+0x40/0x40 [ 525.934298] ? rcu_pm_notify+0xc0/0xc0 [ 525.938195] ? copy_mount_options+0x5f/0x380 [ 525.942603] ? rcu_read_lock_sched_held+0x108/0x120 [ 525.947618] ? kmem_cache_alloc_trace+0x616/0x780 [ 525.952464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.958001] ? _copy_from_user+0xdf/0x150 [ 525.962152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.967689] ? copy_mount_options+0x285/0x380 [ 525.972189] ksys_mount+0x12d/0x140 [ 525.975822] __x64_sys_mount+0xbe/0x150 [ 525.979799] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 525.984818] do_syscall_64+0x1b9/0x820 [ 525.988713] ? syscall_return_slowpath+0x5e0/0x5e0 [ 525.993641] ? syscall_return_slowpath+0x31d/0x5e0 [ 525.998575] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 526.003941] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 526.008792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.013974] RIP: 0033:0x455a79 [ 526.017150] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.036506] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 526.044302] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 526.051564] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 526.058829] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 526.066095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 526.073357] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000002 11:47:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000180)=""/66) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:51 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6c00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'user.', 'vmnet0wlan0[\x00'}, &(0x7f00000000c0)=""/155, 0x9b) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000180)={0x200000, 0x0, 0x20000000000000}) 11:47:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000ffffffff00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:51 executing program 4 (fault-call:2 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0xffffa000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 526.669304] FAULT_INJECTION: forcing a failure. [ 526.669304] name failslab, interval 1, probability 0, space 0, times 0 [ 526.680648] CPU: 1 PID: 29823 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 526.688008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.697356] Call Trace: [ 526.699947] dump_stack+0x1c9/0x2b4 [ 526.703588] ? dump_stack_print_info.cold.2+0x52/0x52 [ 526.708781] ? find_held_lock+0x36/0x1c0 [ 526.712856] should_fail.cold.4+0xa/0x1a [ 526.716927] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 526.722033] ? kasan_check_read+0x11/0x20 [ 526.726180] ? rcu_is_watching+0x8c/0x150 [ 526.730330] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 526.734735] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 526.739155] ? find_held_lock+0x36/0x1c0 [ 526.743233] ? check_same_owner+0x340/0x340 [ 526.747556] ? rcu_note_context_switch+0x730/0x730 [ 526.752485] ? save_stack+0xa9/0xd0 [ 526.756114] __should_failslab+0x124/0x180 [ 526.760358] should_failslab+0x9/0x14 [ 526.764162] kmem_cache_alloc+0x2af/0x760 [ 526.768320] ? find_held_lock+0x36/0x1c0 [ 526.772390] getname_flags+0xd0/0x5a0 [ 526.776195] user_path_at_empty+0x2d/0x50 [ 526.780346] do_mount+0x17a/0x30e0 [ 526.783883] ? do_raw_spin_unlock+0xa7/0x2f0 [ 526.788302] ? copy_mount_string+0x40/0x40 [ 526.792533] ? rcu_pm_notify+0xc0/0xc0 [ 526.796427] ? copy_mount_options+0x5f/0x380 [ 526.800841] ? rcu_read_lock_sched_held+0x108/0x120 [ 526.805857] ? kmem_cache_alloc_trace+0x616/0x780 [ 526.810700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 526.816244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 526.821781] ? copy_mount_options+0x285/0x380 [ 526.826284] ksys_mount+0x12d/0x140 [ 526.829914] __x64_sys_mount+0xbe/0x150 [ 526.833888] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 526.838908] do_syscall_64+0x1b9/0x820 [ 526.842796] ? finish_task_switch+0x1d3/0x870 [ 526.847300] ? syscall_return_slowpath+0x5e0/0x5e0 [ 526.852228] ? syscall_return_slowpath+0x31d/0x5e0 [ 526.857165] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 526.862534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 526.867381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.872566] RIP: 0033:0x455a79 [ 526.875745] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.895111] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 526.902819] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 526.910085] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 11:47:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303058209373175a4ace9122640a303030303030303030303039fb677fe7f376", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0xfff, 0x20040) mkdirat(r1, &(0x7f00000002c0)='./file0/file0\x00', 0x7f) read$FUSE(r0, &(0x7f0000001000), 0x1000) fstat(r0, &(0x7f0000000180)) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getegid() read$FUSE(r0, &(0x7f0000001000), 0x1000) socket$nl_xfrm(0x10, 0x3, 0x6) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 526.917346] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 526.924611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 526.931872] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000003 11:47:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030301430303034303030302c757365725f69603d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:51 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x768d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 526.996384] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:52 executing program 4 (fault-call:2 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:52 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x818d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:52 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x10400, 0x0) ioctl$VT_RESIZE(r0, 0x402c542c, &(0x7f0000000100)={0x41a01a2a, 0x2000000a, 0x1ffffffffffffffe}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x200, 0x0) setsockopt$inet_int(r1, 0x0, 0x21, &(0x7f0000000080)=0x87, 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x200000000000, 0x4) [ 527.071995] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 527.109397] FAULT_INJECTION: forcing a failure. [ 527.109397] name failslab, interval 1, probability 0, space 0, times 0 [ 527.120732] CPU: 1 PID: 29848 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 527.128096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.137445] Call Trace: [ 527.140044] dump_stack+0x1c9/0x2b4 [ 527.143680] ? dump_stack_print_info.cold.2+0x52/0x52 [ 527.148879] ? lock_downgrade+0x8f0/0x8f0 [ 527.153036] should_fail.cold.4+0xa/0x1a [ 527.157103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 527.162204] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 527.166647] ? is_bpf_text_address+0xd7/0x170 [ 527.171148] ? find_held_lock+0x36/0x1c0 [ 527.175229] ? check_same_owner+0x340/0x340 [ 527.179552] ? kasan_slab_free+0xe/0x10 [ 527.183522] ? kmem_cache_free+0x86/0x2d0 [ 527.187670] ? putname+0xf2/0x130 [ 527.191122] ? rcu_note_context_switch+0x730/0x730 [ 527.196046] ? ksys_mount+0x12d/0x140 [ 527.199847] ? __x64_sys_mount+0xbe/0x150 [ 527.204004] __should_failslab+0x124/0x180 [ 527.208241] should_failslab+0x9/0x14 [ 527.212045] kmem_cache_alloc+0x2af/0x760 [ 527.216640] ? kasan_check_write+0x14/0x20 [ 527.220875] ? do_raw_spin_lock+0xc1/0x200 [ 527.225113] alloc_vfsmnt+0xe8/0x9f0 [ 527.228826] ? mnt_free_id.isra.27+0x60/0x60 [ 527.233239] ? graph_lock+0x170/0x170 [ 527.237047] ? rcu_pm_notify+0xc0/0xc0 [ 527.240934] ? init_netconsole+0x343/0x636 [ 527.245168] ? putname+0xf2/0x130 [ 527.248629] ? find_held_lock+0x36/0x1c0 [ 527.252701] ? lock_downgrade+0x8f0/0x8f0 [ 527.256851] ? module_unload_free+0x5d0/0x5d0 [ 527.261414] ? lock_release+0xa30/0xa30 [ 527.265392] ? mpi_free.cold.1+0x19/0x19 [ 527.269458] vfs_kern_mount.part.34+0x90/0x4e0 [ 527.274038] ? may_umount+0xb0/0xb0 [ 527.277663] ? _raw_read_unlock+0x22/0x30 [ 527.281805] ? __get_fs_type+0x97/0xc0 [ 527.285699] do_mount+0x581/0x30e0 [ 527.289251] ? copy_mount_string+0x40/0x40 [ 527.293494] ? copy_mount_options+0x5f/0x380 [ 527.297903] ? rcu_read_lock_sched_held+0x108/0x120 [ 527.302918] ? kmem_cache_alloc_trace+0x616/0x780 [ 527.307760] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 527.313294] ? _copy_from_user+0xdf/0x150 [ 527.317442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.322977] ? copy_mount_options+0x285/0x380 [ 527.327477] ksys_mount+0x12d/0x140 [ 527.331103] __x64_sys_mount+0xbe/0x150 [ 527.335075] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 527.340091] do_syscall_64+0x1b9/0x820 [ 527.343974] ? finish_task_switch+0x1d3/0x870 [ 527.348468] ? syscall_return_slowpath+0x5e0/0x5e0 [ 527.353395] ? syscall_return_slowpath+0x31d/0x5e0 [ 527.358332] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 527.363696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 527.368543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.373731] RIP: 0033:0x455a79 [ 527.376909] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.396286] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 527.403996] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 527.411260] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 11:47:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030060000003030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x191a80, 0x0) write$P9_RCREATE(r1, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x10, 0x4, 0x1}, 0x4}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x800, 0x0) write$FUSE_DIRENT(r2, &(0x7f00000006c0)={0xe0, 0x0, 0x4, [{0x4, 0xc1, 0x9, 0x80, '/dev/vcs\x00'}, {0x5, 0x1, 0x3, 0x6, '.%,'}, {0x0, 0x5c0, 0x5, 0x4, 'fuse\x00'}, {0x2, 0x8, 0xa, 0x0, '/dev/fuse\x00'}, {0x1, 0x767, 0x0, 0x79}, {0x3, 0x0, 0xa, 0x10001, '/dev/fuse\x00'}]}, 0xe0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x3) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x1, {0x100000000000000}}, 0x20) 11:47:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000008800", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 527.418525] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 527.425786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 527.433059] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000004 [ 527.502695] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 527.550900] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={@mcast2={0xff, 0x2, [], 0x1}, 0x41, r2}) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000280)="543ae8b56435b1a3e1ea97acbbc681775813299eafc83cae0f5668", 0x1b) 11:47:53 executing program 4 (fault-call:2 fault-nth:5): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000040)={0x0, 0xfffffffffffffffa}) 11:47:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x2000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0xec, r2, 0x100, 0x1, 0x25dfdbff, {0xf}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x26, 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x100000000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x14}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback={0x0, 0x1}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xd3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1648}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000001}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x18}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffffff}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x10}, 0x40) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:53 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x18d7d, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000200", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0xffffc000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 528.182787] FAULT_INJECTION: forcing a failure. [ 528.182787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 528.194694] CPU: 0 PID: 29872 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 528.202055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.211402] Call Trace: [ 528.213995] dump_stack+0x1c9/0x2b4 [ 528.217625] ? dump_stack_print_info.cold.2+0x52/0x52 [ 528.222824] should_fail.cold.4+0xa/0x1a [ 528.226888] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 528.231996] ? pcpu_balance_workfn+0x1700/0x1700 [ 528.236754] ? find_held_lock+0x36/0x1c0 [ 528.240836] ? check_same_owner+0x340/0x340 [ 528.245161] ? __lockdep_init_map+0x105/0x590 [ 528.249655] ? rcu_note_context_switch+0x730/0x730 [ 528.254699] __alloc_pages_nodemask+0x36e/0xdb0 [ 528.259375] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 528.264399] ? rcu_pm_notify+0xc0/0xc0 [ 528.268299] ? find_held_lock+0x36/0x1c0 [ 528.272456] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 528.278000] alloc_pages_current+0x10c/0x210 [ 528.282423] __get_free_pages+0xf/0x40 [ 528.286319] get_zeroed_page+0x11/0x20 [ 528.291254] mount_fs+0x210/0x328 [ 528.294713] ? mpi_free.cold.1+0x19/0x19 [ 528.298782] vfs_kern_mount.part.34+0xdc/0x4e0 [ 528.303369] ? may_umount+0xb0/0xb0 [ 528.307004] ? _raw_read_unlock+0x22/0x30 [ 528.311161] ? __get_fs_type+0x97/0xc0 [ 528.315063] do_mount+0x581/0x30e0 [ 528.318615] ? copy_mount_string+0x40/0x40 [ 528.322864] ? copy_mount_options+0x5f/0x380 [ 528.327275] ? rcu_read_lock_sched_held+0x108/0x120 [ 528.332298] ? kmem_cache_alloc_trace+0x616/0x780 [ 528.337149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 528.342695] ? _copy_from_user+0xdf/0x150 [ 528.346863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.352417] ? copy_mount_options+0x285/0x380 [ 528.356920] ksys_mount+0x12d/0x140 [ 528.360552] __x64_sys_mount+0xbe/0x150 [ 528.364529] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 528.369546] do_syscall_64+0x1b9/0x820 [ 528.373431] ? finish_task_switch+0x1d3/0x870 [ 528.377926] ? syscall_return_slowpath+0x5e0/0x5e0 [ 528.382857] ? syscall_return_slowpath+0x31d/0x5e0 [ 528.387792] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 528.393161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 528.398008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.403192] RIP: 0033:0x455a79 [ 528.406369] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.425752] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 11:47:53 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x788d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 528.433475] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 528.440745] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 528.448013] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 528.455284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 528.462553] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000005 11:47:53 executing program 4 (fault-call:2 fault-nth:6): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:53 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28f, 0x20000) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="80002183ddb611694a294775e2b2825e57626077fead750ec9", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = socket$inet6(0xa, 0x807, 0xfffffffffffffffc) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 528.506688] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:53 executing program 3: socket$inet6(0xa, 0x1000000000001, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x4000, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x240, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x6, 0x3ff}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x7, 0x20}, 0xc) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x200000) ioctl$VT_RESIZE(r0, 0x402c542c, &(0x7f0000000000)) 11:47:53 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 528.579388] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 528.604450] FAULT_INJECTION: forcing a failure. [ 528.604450] name failslab, interval 1, probability 0, space 0, times 0 [ 528.615793] CPU: 1 PID: 29900 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 528.623157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.632505] Call Trace: [ 528.635098] dump_stack+0x1c9/0x2b4 [ 528.638745] ? dump_stack_print_info.cold.2+0x52/0x52 [ 528.643944] ? trace_hardirqs_on+0x10/0x10 [ 528.648200] should_fail.cold.4+0xa/0x1a [ 528.652272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 528.657379] ? rcu_is_watching+0x8c/0x150 [ 528.661525] ? rcu_pm_notify+0xc0/0xc0 [ 528.665433] ? find_held_lock+0x36/0x1c0 [ 528.669513] ? check_same_owner+0x340/0x340 [ 528.673837] ? rcu_note_context_switch+0x730/0x730 [ 528.678772] __should_failslab+0x124/0x180 [ 528.683007] should_failslab+0x9/0x14 [ 528.686804] kmem_cache_alloc_trace+0x2cb/0x780 [ 528.691471] ? kasan_check_write+0x14/0x20 [ 528.695705] ? do_raw_spin_lock+0xc1/0x200 [ 528.699941] sget_userns+0x1cf/0xf20 [ 528.703650] ? get_anon_bdev+0x300/0x300 [ 528.707716] ? destroy_unused_super.part.11+0x110/0x110 [ 528.713079] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 528.717925] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 528.722946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.728479] ? cap_capable+0x1f9/0x260 [ 528.732371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.737909] ? security_capable+0x99/0xc0 [ 528.742059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.747595] ? ns_capable_common+0x13f/0x170 [ 528.752006] ? get_anon_bdev+0x300/0x300 [ 528.756064] sget+0x10b/0x150 [ 528.759173] ? fuse_get_root_inode+0x1b0/0x1b0 [ 528.763754] mount_nodev+0x33/0x110 [ 528.767383] fuse_mount+0x2c/0x40 [ 528.770837] mount_fs+0xae/0x328 [ 528.774206] vfs_kern_mount.part.34+0xdc/0x4e0 [ 528.778788] ? may_umount+0xb0/0xb0 [ 528.782414] ? _raw_read_unlock+0x22/0x30 [ 528.786559] ? __get_fs_type+0x97/0xc0 [ 528.790462] do_mount+0x581/0x30e0 [ 528.794003] ? copy_mount_string+0x40/0x40 [ 528.798241] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.802998] ? retint_kernel+0x10/0x10 [ 528.806890] ? copy_mount_options+0x1f0/0x380 [ 528.811387] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 528.816232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.821765] ? copy_mount_options+0x285/0x380 [ 528.826264] ksys_mount+0x12d/0x140 [ 528.829891] __x64_sys_mount+0xbe/0x150 [ 528.833886] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 528.839426] do_syscall_64+0x1b9/0x820 [ 528.843313] ? finish_task_switch+0x1d3/0x870 [ 528.847806] ? syscall_return_slowpath+0x5e0/0x5e0 [ 528.852735] ? syscall_return_slowpath+0x31d/0x5e0 [ 528.857670] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 528.863034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 528.867886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.873071] RIP: 0033:0x455a79 [ 528.876256] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.895639] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 528.903345] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 528.910607] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 528.917869] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 11:47:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740007fffffe00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2b02abafe6350000003d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000280)={0x6, &(0x7f0000000340)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @random}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000002000), 0x1000) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000002c0), &(0x7f0000000480)=0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(r2, &(0x7f0000000080)={0x7}, 0x8) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:53 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4c00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 528.925136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 528.932397] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000006 11:47:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x3, 0x700, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f0000000040), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x1, 0xf6, 'irlan0\x00', 'yam0\x00', 'bpq0\x00', 'veth0_to_bond\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xd8, 0x128}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x24b}}}, @common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0xffffffffffffffff}}}]}, @common=@log={'log\x00', 0x28, {{0x7, "e49f921f37894421f9a43a767e23b59a67aa0e776d476b90d8714ac84591", 0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{{{0x5, 0x71, 0x0, 'team0\x00', 'gretap0\x00', 'bond0\x00', 'vcan0\x00', @random="fa0dff102393", [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0x70, 0x100, 0x178}, [@common=@ERROR={'ERROR\x00', 0x20, {"bccd90be5e53cbe9c5a07cbc4d0812ed690d11a531b650cf46a02654ee5a"}}, @common=@ERROR={'ERROR\x00', 0x20, {"bf27d9c438ba7303a486a9fcccfd39464f97df10c4998edfa194d3abd0e3"}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x9, 0x8, 0xd26, 0x0, 0x0, "535a16d360643f9ca20fcb319b97a66854d2bbf8536b0a3913d8c5c46dca5ec30c6a122064ea9d54eab591c979917740feb957409bddbca26ebe55362fa13e9d"}}}}, {{{0x9, 0x1, 0x0, 'veth1\x00', 'gretap0\x00', 'team0\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0xff, 0xff, 0xff], 0x2f0, 0x370, 0x3a0, [@ip={'ip\x00', 0x20, {{@broadcast=0xffffffff, @remote={0xac, 0x14, 0x14, 0xbb}, 0xffffffff, 0xffffffff, 0x8, 0x6c, 0x1, 0x4, 0x4e23, 0x4e24, 0x4e21, 0x4e24}}}, @bpf0={'bpf\x00', 0x210, {{0x1f, [{0x7, 0x0, 0x40, 0x6}, {0x1, 0x81, 0x8, 0x1}, {0xa4, 0xdc66, 0x80000001, 0x1ff}, {0xffff, 0x0, 0x4, 0x4}, {0x0, 0x7ff, 0xfffffffffffffff7, 0x81}, {0x3, 0xc3e, 0x6, 0x40}, {0x8a3, 0x1ff, 0x3ff, 0x7f}, {0x2, 0x80000000, 0x8001, 0x413}, {0x401, 0xee0c, 0x800, 0x1}, {0x4, 0x5, 0x1, 0xffff}, {0xfffffffffffff63d, 0x49, 0xc61f, 0xfffffffffffffffb}, {0x40, 0x80000000, 0x4, 0x5}, {0x2, 0x7fff, 0xbb, 0x9}, {0x5, 0x7fff, 0xd10b, 0x3f}, {0x3f, 0x0, 0x9661, 0x8}, {0x6, 0x3, 0x3ff, 0x8001}, {0x80000001, 0x232, 0x2, 0x2}, {0x9, 0x100000000, 0x4, 0x9}, {0x3, 0x200, 0xb8}, {0x3, 0xfffffffffffffffe, 0xffffffffffffff01, 0x6}, {0x0, 0x1f, 0x1, 0xfffffffffffeffff}, {0x4, 0x1000, 0x7fff, 0x9}, {0x1, 0x200, 0x8001, 0x2}, {0x170, 0x10000, 0x1, 0x82}, {0x7ff, 0xb2e, 0x9, 0xd0}, {0x6, 0x40, 0x0, 0xffffffffffffffc1}, {0x4, 0xfffffffffffffff7, 0x8001, 0x1f}, {0x80, 0x7ff, 0x6, 0x4}, {0x9, 0x9, 0x1, 0x4}, {0x4a, 0x2, 0x7fff, 0xffffffffffff7fff}, {0x8, 0x9, 0x7fffffff, 0x10000}, {0x0, 0x1000, 0x2, 0x80000001}, {0x7ff, 0x1, 0x100000000, 0x7}, {0xfffffffffffffffd, 0x9, 0x200, 0x6}, {0xfffffffffffffffe, 0xfffffffffffffffc, 0xf32, 0x5}, {0x7aaa, 0x1d, 0x6, 0x5}, {0xffffffffffffff20, 0x3, 0xffffffff00000001, 0x3}, {0x40, 0x20, 0x5, 0x200}, {0x10001, 0x9, 0xfffffffffffffffb, 0x9}, {0x0, 0x8, 0x2, 0x6}, {0x4, 0x1a, 0x8000, 0x10000}, {0x19, 0xeef3, 0xa1c, 0x8}, {0x3, 0xc925, 0x1, 0x20}, {0x4, 0x3f, 0x80, 0x2}, {0x7, 0x6, 0x1, 0x3}, {0x7fff, 0x3f, 0x8000, 0x95}, {0x70000000000000, 0xffffffffffffdf4f, 0x5, 0x9}, {0x80000000, 0xb4fb837, 0x6, 0x7}, {0x0, 0x62776aa1, 0x3, 0x9}, {0x8000, 0xfffffffffffffff9, 0x5, 0x9}, {0x1, 0x1, 0xfb, 0xffffffff}, {0x1ff, 0xffff, 0x3e2, 0x1}, {0x7, 0x8, 0x2, 0xfff}, {0xffffffffffffff80, 0x2, 0x6, 0x9}, {0xaa9, 0x100000000, 0xb94, 0x10000}, {0xffffffff, 0x4, 0x4, 0x1000}, {0x3f, 0x3bd73a96, 0x9, 0x3ff}, {0x9, 0x80000, 0x80000000, 0x8}, {0x20, 0x6, 0x81, 0xfff}, {0x7, 0x40, 0x3, 0x3}, {0x3, 0x8001, 0x3536, 0xfffffffffffffabb}, {0x28, 0x338, 0x1, 0xfffffffffffff000}, {0x7, 0x180000000000000, 0x1, 0x8000}, {0x1, 0x100, 0x5669d20b, 0x100}], 0x5f9}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0x800}}}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x40}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x778) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 528.998662] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 529.036900] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:54 executing program 4 (fault-call:2 fault-nth:7): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r1, &(0x7f0000003580)=[{{&(0x7f0000000180), 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/35, 0x23}], 0x1, &(0x7f0000000340)=""/69, 0x45, 0x4}, 0x100000001}, {{&(0x7f0000000480)=@llc, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/22, 0x16}], 0x1, &(0x7f0000000540)=""/230, 0xe6, 0x8}, 0x5}, {{&(0x7f0000000640)=@ax25, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000006c0)=""/64, 0x40}, {&(0x7f0000000700)=""/51, 0x33}, {&(0x7f0000000740)=""/255, 0xff}, {&(0x7f0000000840)=""/233, 0xe9}, {&(0x7f0000000940)=""/218, 0xda}, {&(0x7f0000000a40)=""/69, 0x45}], 0x6, &(0x7f0000000b40)=""/143, 0x8f, 0x4}, 0x5}, {{&(0x7f0000000c00)=@ax25, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000c80)=""/23, 0x17}, {&(0x7f0000000cc0)=""/44, 0x2c}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/48, 0x30}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/87, 0x57}], 0x6, 0x0, 0x0, 0x12926ae2}, 0x1000}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000f00)=""/26, 0x1a}], 0x1, &(0x7f0000003000)=""/142, 0x8e, 0x5}, 0xfffffffffffffffc}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000f80)=""/105, 0x69}, {&(0x7f00000030c0)=""/121, 0x79}, {&(0x7f0000003140)=""/138, 0x8a}, {&(0x7f0000003200)=""/26, 0x1a}, {&(0x7f0000003240)=""/113, 0x71}, {&(0x7f00000032c0)=""/55, 0x37}, {&(0x7f0000003300)=""/149, 0x95}, {&(0x7f00000033c0)=""/188, 0xbc}], 0x8, &(0x7f0000003500)=""/94, 0x5e, 0xbda}}], 0x6, 0x10100, &(0x7f0000003700)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000003840)='./file0/file0\x00', 0x0, 0x20) fcntl$notify(r1, 0x402, 0x40000008006) r2 = syz_open_dev$audion(&(0x7f0000003740)='/dev/audio#\x00', 0x1, 0x400001) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000003780)={0x4, 0x1f, [{0xffff, 0x0, 0xe2c}, {0x10001, 0x0, 0x3}, {0x3, 0x0, 0xffff}, {0xffffffff, 0x0, 0xfffffffffffffff8}]}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000003800)='/dev/null\x00', 0x0, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000040)={0x53c, 0x0, 0x3, {0x0, 0x4}}, 0x20) [ 529.135841] FAULT_INJECTION: forcing a failure. [ 529.135841] name failslab, interval 1, probability 0, space 0, times 0 [ 529.147189] CPU: 1 PID: 29922 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 529.154555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.163899] Call Trace: [ 529.166493] dump_stack+0x1c9/0x2b4 [ 529.170139] ? dump_stack_print_info.cold.2+0x52/0x52 [ 529.175339] should_fail.cold.4+0xa/0x1a [ 529.179399] ? kasan_check_write+0x14/0x20 [ 529.183637] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 529.188741] ? graph_lock+0x170/0x170 [ 529.192539] ? wait_for_completion+0x8d0/0x8d0 [ 529.197123] ? graph_lock+0x170/0x170 [ 529.200928] ? find_held_lock+0x36/0x1c0 [ 529.204993] ? __lock_is_held+0xb5/0x140 [ 529.209065] ? check_same_owner+0x340/0x340 [ 529.213910] ? rcu_note_context_switch+0x730/0x730 [ 529.218845] __should_failslab+0x124/0x180 [ 529.223088] should_failslab+0x9/0x14 [ 529.226887] __kmalloc+0x2c8/0x760 [ 529.230430] ? __lockdep_init_map+0x105/0x590 [ 529.234922] ? lock_acquire+0x1e4/0x540 [ 529.238895] ? __lockdep_init_map+0x105/0x590 [ 529.243390] ? __list_lru_init+0xe5/0x7c0 [ 529.247550] __list_lru_init+0xe5/0x7c0 [ 529.251529] ? list_lru_destroy+0x4d0/0x4d0 [ 529.255853] ? __lockdep_init_map+0x105/0x590 [ 529.260352] ? __init_waitqueue_head+0x9e/0x150 [ 529.265017] ? init_wait_entry+0x1c0/0x1c0 [ 529.269251] ? __lockdep_init_map+0x105/0x590 [ 529.273755] sget_userns+0x755/0xf20 [ 529.277466] ? get_anon_bdev+0x300/0x300 [ 529.281536] ? destroy_unused_super.part.11+0x110/0x110 [ 529.286900] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 529.291746] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 529.296789] ? cap_capable+0x1f9/0x260 [ 529.300686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.306224] ? security_capable+0x99/0xc0 [ 529.310379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.315916] ? ns_capable_common+0x13f/0x170 [ 529.320326] ? get_anon_bdev+0x300/0x300 [ 529.324384] sget+0x10b/0x150 [ 529.327493] ? fuse_get_root_inode+0x1b0/0x1b0 [ 529.332077] mount_nodev+0x33/0x110 [ 529.335703] fuse_mount+0x2c/0x40 [ 529.339155] mount_fs+0xae/0x328 [ 529.342525] vfs_kern_mount.part.34+0xdc/0x4e0 [ 529.347112] ? may_umount+0xb0/0xb0 [ 529.350742] ? _raw_read_unlock+0x22/0x30 [ 529.354895] ? __get_fs_type+0x97/0xc0 [ 529.358790] do_mount+0x581/0x30e0 [ 529.362365] ? copy_mount_string+0x40/0x40 [ 529.366602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.371364] ? retint_kernel+0x10/0x10 [ 529.375262] ? __sanitizer_cov_trace_const_cmp8+0xf/0x20 [ 529.380715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.386256] ? copy_mount_options+0x285/0x380 [ 529.390760] ksys_mount+0x12d/0x140 [ 529.394392] __x64_sys_mount+0xbe/0x150 [ 529.398369] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 529.403392] do_syscall_64+0x1b9/0x820 [ 529.407291] ? finish_task_switch+0x1d3/0x870 [ 529.411788] ? syscall_return_slowpath+0x5e0/0x5e0 [ 529.416722] ? syscall_return_slowpath+0x31d/0x5e0 [ 529.421656] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 529.427023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 529.431869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.437051] RIP: 0033:0x455a79 [ 529.440233] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.459603] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 529.467314] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 529.474576] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 529.481843] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 529.489104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 529.496371] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000007 11:47:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000001c0)='./file1\x00', 0x460000, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:54 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7109, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x80000000000, 0xff, 0xffffffff00000001, 0x80000000, 0x4, 0xfffffffffffffff9, 0x3, 0x200, 0x3, 0x9, 0x81, 0x4}) 11:47:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000200", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:54 executing program 4 (fault-call:2 fault-nth:8): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 529.755706] FAULT_INJECTION: forcing a failure. [ 529.755706] name failslab, interval 1, probability 0, space 0, times 0 [ 529.767152] CPU: 0 PID: 29943 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 529.774520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.783879] Call Trace: [ 529.786484] dump_stack+0x1c9/0x2b4 [ 529.790131] ? dump_stack_print_info.cold.2+0x52/0x52 [ 529.795326] ? kernel_text_address+0x79/0xf0 [ 529.799745] should_fail.cold.4+0xa/0x1a [ 529.803815] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 529.808927] ? graph_lock+0x170/0x170 [ 529.812727] ? save_stack+0x43/0xd0 [ 529.816355] ? kasan_kmalloc+0xc4/0xe0 [ 529.820240] ? __kmalloc+0x14e/0x760 [ 529.823962] ? find_held_lock+0x36/0x1c0 [ 529.828029] ? __lock_is_held+0xb5/0x140 [ 529.832104] ? check_same_owner+0x340/0x340 [ 529.836456] ? rcu_note_context_switch+0x730/0x730 [ 529.841393] __should_failslab+0x124/0x180 [ 529.845630] should_failslab+0x9/0x14 [ 529.849432] kmem_cache_alloc_node_trace+0x26f/0x770 [ 529.854552] __kmalloc_node+0x33/0x70 [ 529.858360] kvmalloc_node+0x65/0xf0 [ 529.862088] __list_lru_init+0x56d/0x7c0 [ 529.866159] ? list_lru_destroy+0x4d0/0x4d0 [ 529.870506] ? __lockdep_init_map+0x105/0x590 [ 529.875013] ? __init_waitqueue_head+0x9e/0x150 [ 529.879686] ? init_wait_entry+0x1c0/0x1c0 [ 529.883925] ? __lockdep_init_map+0x105/0x590 [ 529.888434] sget_userns+0x755/0xf20 [ 529.892156] ? get_anon_bdev+0x300/0x300 [ 529.896232] ? destroy_unused_super.part.11+0x110/0x110 [ 529.901609] ? __alloc_pages_nodemask+0xb10/0xdb0 11:47:54 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 529.906463] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 529.911490] ? cap_capable+0x1f9/0x260 [ 529.915394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.920942] ? security_capable+0x99/0xc0 [ 529.925103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.930648] ? ns_capable_common+0x13f/0x170 [ 529.935065] ? get_anon_bdev+0x300/0x300 [ 529.939130] sget+0x10b/0x150 [ 529.941234] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 529.942243] ? fuse_get_root_inode+0x1b0/0x1b0 [ 529.942262] mount_nodev+0x33/0x110 [ 529.942280] fuse_mount+0x2c/0x40 [ 529.942297] mount_fs+0xae/0x328 [ 529.942318] vfs_kern_mount.part.34+0xdc/0x4e0 [ 529.942338] ? may_umount+0xb0/0xb0 [ 529.974747] ? _raw_read_unlock+0x22/0x30 [ 529.978899] ? __get_fs_type+0x97/0xc0 [ 529.982821] do_mount+0x581/0x30e0 [ 529.986371] ? copy_mount_string+0x40/0x40 [ 529.990616] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.995385] ? retint_kernel+0x10/0x10 [ 529.999301] ? copy_mount_options+0x1de/0x380 [ 529.999845] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 530.003796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.003813] ? copy_mount_options+0x285/0x380 [ 530.003833] ksys_mount+0x12d/0x140 [ 530.003851] __x64_sys_mount+0xbe/0x150 [ 530.003868] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 530.003885] do_syscall_64+0x1b9/0x820 [ 530.003903] ? finish_task_switch+0x1d3/0x870 [ 530.043975] ? syscall_return_slowpath+0x5e0/0x5e0 [ 530.048907] ? syscall_return_slowpath+0x31d/0x5e0 [ 530.053832] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 530.059199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 530.064045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.069231] RIP: 0033:0x455a79 [ 530.072412] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.091744] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 530.099438] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 11:47:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x1fe9, 0x5f45}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e20, 0x4, @loopback={0x0, 0x1}, 0x4a8}}, [0x9, 0x100000001, 0x1, 0x80000000, 0xcf23, 0x1, 0x3, 0x6, 0x80000000, 0xe3, 0x6, 0x8, 0x66ec8e3a, 0x1, 0x1121]}, &(0x7f0000000240)=0x100) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 530.106695] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 530.113946] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 530.121204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 530.128455] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000008 11:47:55 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x74, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:55 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6c000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x5}}, 0x5, 0x20, 0x1, 0x8, 0x31cb}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x40, 0x4, 0xc, 0x2, 0x9000, 0x3ff, 0x3f53, 0x0, r1}, &(0x7f0000000180)=0x20) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f00000001c0)=0x101, 0x4) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) [ 530.205325] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 530.233363] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_int(r1, 0x1, 0x20000026, &(0x7f00000002c0), &(0x7f0000000040)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000740)={0x0, 0xf6, "422e0edacd4f9a4352499d6c4da9a1e62d95e824c3a5486a45c045de10934509e7dc5291a53b435636e76cef2d164aae097648f631d7c20119f6536e7c38b72b243fda104d7c468a65e6f3c3ef2f9611955692506005ecda8a1a16ce0f75ae74ed7e8870b3d90627d52d7bc9601e8eed129ebcf792035d82afc4d8350782b717009454a8ad0b724ef75a348bc501be3cf3d434a12f8743016b99d9866a3f9747865c5ae2c203b1535060e01204347c9988d406b0fa705759aa672bbf09253c95ed3295407e2467d8d4a63a785922157cb2cedf3acdfd8467b571179c6e3efedf25808e488fda6dc833f190cdeb2febbbb0a5149cfbbd"}, &(0x7f00000004c0)=0xfe) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000840)={r3, 0x1}, 0x8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='/dev/fuse\x00', 0xffffffffffffff9c}, 0x172) ioctl$KVM_GET_IRQCHIP(r4, 0xc208ae62, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00cf9687ce8f8438a700704b1f1373917bedf3aca65c7949031a04c8e38e7845ec620eba37af53ad"]) r5 = syz_open_dev$sndpcmc(&(0x7f0000000a00)='/dev/snd/pcmC#D#c\x00', 0x5, 0x40) inotify_init() getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000880)={r3, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}, 0x2, 0x4}, &(0x7f0000000940)=0x90) r6 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x2, 0x8000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000980)={r3, 0x1f, 0x100}, &(0x7f00000009c0)=0x8) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f0000000540)={@pppol2tp={0x18, 0x1, {0x0, r6, {0x2, 0x4e24}, 0x2, 0x0, 0x4, 0x3}}, {&(0x7f0000002000)=""/4096, 0x1000}, &(0x7f0000000380), 0x1}, 0xa0) setsockopt$inet6_opts(r5, 0x29, 0x3b, &(0x7f00000006c0)=ANY=[@ANYBLOB="730a06000000000000d490f32fd5de3e33f79b9ec8558201050200000000001d3a168400ffffac1414120000000000050200080001ff000000fff3000000000000000000000000"], 0x58) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r8 = socket(0x4, 0x800, 0x0) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) readlinkat(r5, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000003000)=""/4096, 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x134a) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000008800", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:55 executing program 4 (fault-call:2 fault-nth:9): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 530.377279] FAULT_INJECTION: forcing a failure. [ 530.377279] name failslab, interval 1, probability 0, space 0, times 0 [ 530.388366] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 530.388701] CPU: 1 PID: 29980 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 530.405089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.414443] Call Trace: [ 530.417044] dump_stack+0x1c9/0x2b4 [ 530.420689] ? dump_stack_print_info.cold.2+0x52/0x52 [ 530.425894] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 530.430757] ? kernel_text_address+0x79/0xf0 [ 530.433515] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 530.435182] should_fail.cold.4+0xa/0x1a [ 530.435211] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 530.435237] ? graph_lock+0x170/0x170 [ 530.435258] ? save_stack+0x43/0xd0 [ 530.460951] ? kasan_kmalloc+0xc4/0xe0 [ 530.464849] ? find_held_lock+0x36/0x1c0 [ 530.468926] ? __lock_is_held+0xb5/0x140 [ 530.473008] ? check_same_owner+0x340/0x340 [ 530.477340] ? rcu_note_context_switch+0x730/0x730 [ 530.482283] __should_failslab+0x124/0x180 [ 530.486532] should_failslab+0x9/0x14 [ 530.490340] kmem_cache_alloc_node_trace+0x26f/0x770 [ 530.495463] __kmalloc_node+0x33/0x70 [ 530.499273] kvmalloc_node+0x65/0xf0 [ 530.502997] __list_lru_init+0x56d/0x7c0 [ 530.507068] ? list_lru_destroy+0x4d0/0x4d0 [ 530.511397] ? __lockdep_init_map+0x105/0x590 [ 530.515905] ? __init_waitqueue_head+0x9e/0x150 [ 530.520575] ? init_wait_entry+0x1c0/0x1c0 [ 530.524815] ? __lockdep_init_map+0x105/0x590 [ 530.529322] sget_userns+0x755/0xf20 [ 530.533040] ? get_anon_bdev+0x300/0x300 [ 530.537115] ? destroy_unused_super.part.11+0x110/0x110 [ 530.542483] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 530.547339] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 530.552373] ? cap_capable+0x1f9/0x260 [ 530.556284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.561830] ? security_capable+0x99/0xc0 [ 530.565991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.571530] ? ns_capable_common+0x13f/0x170 [ 530.575946] ? get_anon_bdev+0x300/0x300 [ 530.580011] sget+0x10b/0x150 [ 530.583130] ? fuse_get_root_inode+0x1b0/0x1b0 [ 530.587716] mount_nodev+0x33/0x110 [ 530.591344] fuse_mount+0x2c/0x40 [ 530.594797] mount_fs+0xae/0x328 [ 530.598172] vfs_kern_mount.part.34+0xdc/0x4e0 [ 530.602758] ? may_umount+0xb0/0xb0 [ 530.606391] ? _raw_read_unlock+0x22/0x30 [ 530.610541] ? __get_fs_type+0x97/0xc0 [ 530.614443] do_mount+0x581/0x30e0 [ 530.617998] ? copy_mount_string+0x40/0x40 [ 530.622244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 530.627012] ? retint_kernel+0x10/0x10 [ 530.630912] ? copy_mount_options+0x1a1/0x380 [ 530.635410] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 530.640261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.645803] ? copy_mount_options+0x285/0x380 [ 530.650305] ksys_mount+0x12d/0x140 [ 530.653940] __x64_sys_mount+0xbe/0x150 [ 530.658017] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 530.663047] do_syscall_64+0x1b9/0x820 [ 530.666937] ? finish_task_switch+0x1d3/0x870 [ 530.671443] ? syscall_return_slowpath+0x5e0/0x5e0 [ 530.676380] ? syscall_return_slowpath+0x31d/0x5e0 [ 530.681322] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 530.686691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 530.691541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.696730] RIP: 0033:0x455a79 [ 530.699912] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.719329] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 530.727038] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 530.734305] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 530.741573] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 530.748843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 530.756109] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000009 11:47:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643d3fa7833f4177b93e6d38d40ef6595d4013eb898005b928dfefb93d8afdf7078295b79336751556dbdc25b96126dc5efaf4107acc5fc96cd3c6178d0e9d932cd5da741a964b97f196713ff4a25557f00705b24fe3495215546ecca3e1b711c94a79f6a1c86971cf5a79d14458266bc18579e93edbe5b3dc1b2d4559acd59f2fd333e17d080d67f4e7ee79b89ee40842291e86bd240e98d5", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x2) 11:47:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000180)) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:56 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x8000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4014, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) lookup_dcookie(0x41, &(0x7f0000000180)=""/110, 0x6e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:56 executing program 4 (fault-call:2 fault-nth:10): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2d67728e01005f69643dedb69d53195d3c2ba14f58be03ab274af69a5074370d11f5be0deda88ed03340b994f7a40ac4bf8a52d8efca8ce4556ad7f951a9eb1aad45b1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 531.183817] FAULT_INJECTION: forcing a failure. [ 531.183817] name failslab, interval 1, probability 0, space 0, times 0 [ 531.195143] CPU: 0 PID: 30015 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 531.202499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.211841] Call Trace: [ 531.214445] dump_stack+0x1c9/0x2b4 [ 531.218069] ? dump_stack_print_info.cold.2+0x52/0x52 [ 531.223250] ? __save_stack_trace+0x8d/0xf0 [ 531.227659] should_fail.cold.4+0xa/0x1a [ 531.231713] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 531.236810] ? save_stack+0x43/0xd0 [ 531.240427] ? kasan_kmalloc+0xc4/0xe0 [ 531.244301] ? kmem_cache_alloc_trace+0x152/0x780 [ 531.249131] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 531.254307] ? __list_lru_init+0x46a/0x7c0 [ 531.258528] ? sget_userns+0x755/0xf20 [ 531.262409] ? graph_lock+0x170/0x170 [ 531.266214] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 531.270957] ? do_mount+0x581/0x30e0 [ 531.274661] ? ksys_mount+0x12d/0x140 [ 531.278464] ? __x64_sys_mount+0xbe/0x150 [ 531.282605] ? do_syscall_64+0x1b9/0x820 [ 531.286662] ? find_held_lock+0x36/0x1c0 [ 531.290718] ? __lock_is_held+0xb5/0x140 [ 531.294779] ? check_same_owner+0x340/0x340 [ 531.299107] ? rcu_note_context_switch+0x730/0x730 [ 531.304039] __should_failslab+0x124/0x180 [ 531.308264] should_failslab+0x9/0x14 [ 531.312056] kmem_cache_alloc_trace+0x2cb/0x780 [ 531.316724] ? __kmalloc_node+0x33/0x70 [ 531.320687] ? __kmalloc_node+0x33/0x70 [ 531.324651] ? rcu_read_lock_sched_held+0x108/0x120 [ 531.329664] __memcg_init_list_lru_node+0x185/0x2d0 [ 531.334668] ? kvfree_rcu+0x20/0x20 [ 531.338285] ? __kmalloc_node+0x47/0x70 [ 531.342255] __list_lru_init+0x46a/0x7c0 [ 531.346309] ? list_lru_destroy+0x4d0/0x4d0 [ 531.350880] ? __lockdep_init_map+0x105/0x590 [ 531.355367] ? __init_waitqueue_head+0x9e/0x150 [ 531.360027] ? init_wait_entry+0x1c0/0x1c0 [ 531.364250] ? __lockdep_init_map+0x105/0x590 [ 531.368743] sget_userns+0x755/0xf20 [ 531.372442] ? get_anon_bdev+0x300/0x300 [ 531.376497] ? destroy_unused_super.part.11+0x110/0x110 [ 531.382339] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 531.387175] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 531.392202] ? cap_capable+0x1f9/0x260 [ 531.396084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.401607] ? security_capable+0x99/0xc0 [ 531.405747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.411273] ? ns_capable_common+0x13f/0x170 [ 531.415675] ? get_anon_bdev+0x300/0x300 [ 531.419722] sget+0x10b/0x150 [ 531.422820] ? fuse_get_root_inode+0x1b0/0x1b0 [ 531.427400] mount_nodev+0x33/0x110 [ 531.431020] fuse_mount+0x2c/0x40 [ 531.434470] mount_fs+0xae/0x328 [ 531.437829] vfs_kern_mount.part.34+0xdc/0x4e0 [ 531.442408] ? may_umount+0xb0/0xb0 [ 531.446041] ? _raw_read_unlock+0x22/0x30 [ 531.450174] ? __get_fs_type+0x97/0xc0 [ 531.454057] do_mount+0x581/0x30e0 [ 531.457590] ? copy_mount_string+0x40/0x40 [ 531.461822] ? copy_mount_options+0x5f/0x380 [ 531.466218] ? rcu_read_lock_sched_held+0x108/0x120 [ 531.471221] ? kmem_cache_alloc_trace+0x616/0x780 [ 531.476054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.481580] ? _copy_from_user+0xdf/0x150 [ 531.485718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.491239] ? copy_mount_options+0x285/0x380 [ 531.495727] ksys_mount+0x12d/0x140 [ 531.499342] __x64_sys_mount+0xbe/0x150 [ 531.503305] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 531.508323] do_syscall_64+0x1b9/0x820 [ 531.512195] ? finish_task_switch+0x1d3/0x870 [ 531.516678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 531.521595] ? syscall_return_slowpath+0x31d/0x5e0 [ 531.526518] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 531.531872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 531.536710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.541894] RIP: 0033:0x455a79 [ 531.545068] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.564402] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 531.572101] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 531.579353] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 531.586612] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 531.593864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 531.601119] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000000a 11:47:56 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x788d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="02345d00000000") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'bond0\x00', 0xfffffffffffff800}) [ 531.632080] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:56 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7a000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 531.691919] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:56 executing program 4 (fault-call:2 fault-nth:11): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="42c196ea025cc83d6d345f") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 531.785591] FAULT_INJECTION: forcing a failure. [ 531.785591] name failslab, interval 1, probability 0, space 0, times 0 [ 531.795414] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 531.796912] CPU: 0 PID: 30039 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 531.813426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.822774] Call Trace: [ 531.825384] dump_stack+0x1c9/0x2b4 [ 531.829023] ? dump_stack_print_info.cold.2+0x52/0x52 [ 531.834220] ? __save_stack_trace+0x8d/0xf0 [ 531.838560] should_fail.cold.4+0xa/0x1a [ 531.840804] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 531.842632] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 531.842652] ? save_stack+0x43/0xd0 [ 531.842669] ? kasan_kmalloc+0xc4/0xe0 [ 531.842685] ? kmem_cache_alloc_trace+0x152/0x780 [ 531.842703] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 531.874458] ? __list_lru_init+0x46a/0x7c0 [ 531.878695] ? sget_userns+0x755/0xf20 [ 531.882585] ? graph_lock+0x170/0x170 [ 531.886390] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 531.891145] ? do_mount+0x581/0x30e0 [ 531.894861] ? ksys_mount+0x12d/0x140 [ 531.898664] ? __x64_sys_mount+0xbe/0x150 [ 531.902815] ? do_syscall_64+0x1b9/0x820 [ 531.906882] ? find_held_lock+0x36/0x1c0 [ 531.910953] ? __lock_is_held+0xb5/0x140 [ 531.915024] ? check_same_owner+0x340/0x340 [ 531.919355] ? rcu_note_context_switch+0x730/0x730 [ 531.924292] __should_failslab+0x124/0x180 [ 531.928533] should_failslab+0x9/0x14 [ 531.932334] kmem_cache_alloc_trace+0x2cb/0x780 [ 531.937010] ? __kmalloc_node+0x33/0x70 [ 531.940986] ? __kmalloc_node+0x33/0x70 [ 531.944966] ? rcu_read_lock_sched_held+0x108/0x120 [ 531.949989] __memcg_init_list_lru_node+0x185/0x2d0 [ 531.955018] ? kvfree_rcu+0x20/0x20 [ 531.958649] ? __kmalloc_node+0x47/0x70 [ 531.962632] __list_lru_init+0x46a/0x7c0 [ 531.966696] ? list_lru_destroy+0x4d0/0x4d0 [ 531.971024] ? __lockdep_init_map+0x105/0x590 [ 531.975282] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x4000) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000080)={0xff, 0x4, 0x1}) ioctl$KIOCSOUND(r1, 0x4b2f, 0x3) [ 531.975521] ? __init_waitqueue_head+0x9e/0x150 [ 531.989361] ? init_wait_entry+0x1c0/0x1c0 [ 531.993600] ? __lockdep_init_map+0x105/0x590 [ 531.998106] sget_userns+0x755/0xf20 [ 532.001824] ? get_anon_bdev+0x300/0x300 [ 532.005896] ? destroy_unused_super.part.11+0x110/0x110 [ 532.011263] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 532.016114] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 532.019406] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 532.021136] ? cap_capable+0x1f9/0x260 [ 532.021160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.021176] ? security_capable+0x99/0xc0 [ 532.021195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.021211] ? ns_capable_common+0x13f/0x170 [ 532.021232] ? get_anon_bdev+0x300/0x300 [ 532.057870] sget+0x10b/0x150 [ 532.060980] ? fuse_get_root_inode+0x1b0/0x1b0 [ 532.065563] mount_nodev+0x33/0x110 [ 532.069194] fuse_mount+0x2c/0x40 [ 532.072651] mount_fs+0xae/0x328 [ 532.076030] vfs_kern_mount.part.34+0xdc/0x4e0 [ 532.080615] ? may_umount+0xb0/0xb0 [ 532.084246] ? _raw_read_unlock+0x22/0x30 [ 532.088396] ? __get_fs_type+0x97/0xc0 [ 532.092293] do_mount+0x581/0x30e0 [ 532.095844] ? copy_mount_string+0x40/0x40 [ 532.100095] ? copy_mount_options+0x5f/0x380 [ 532.104505] ? rcu_read_lock_sched_held+0x108/0x120 [ 532.109520] ? kmem_cache_alloc_trace+0x616/0x780 [ 532.114374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.119915] ? _copy_from_user+0xdf/0x150 [ 532.124067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.129602] ? copy_mount_options+0x285/0x380 [ 532.134099] ksys_mount+0x12d/0x140 [ 532.137726] __x64_sys_mount+0xbe/0x150 [ 532.141704] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 532.146734] do_syscall_64+0x1b9/0x820 [ 532.150621] ? finish_task_switch+0x1d3/0x870 [ 532.155118] ? syscall_return_slowpath+0x5e0/0x5e0 [ 532.160747] ? syscall_return_slowpath+0x31d/0x5e0 [ 532.165683] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 532.171055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 532.175906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.181124] RIP: 0033:0x455a79 [ 532.184304] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.203682] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 532.211396] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 532.218665] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 532.225930] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 532.233194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 532.240464] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000000b 11:47:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="6664263e7f102f63511c9b2376bb63e155ed7008ed441ca2ae4dc6e15a213a3d60783552589b5833d0b144524793b05e7564cba20289ea676e7c2e85cdd827a75e632157e82fcfcb38c7160a8a2c7e8c85c23da60bdbf8ad5ec118b30bec6c71ba0e91fc20fde82e3fb826669df39d58c94c1d2c64", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00000000ed7fd767f6cc", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='/dev/fuse\x00'}, 0x10) mkdirat(r1, &(0x7f00000001c0)='./file0/file0\x00', 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:57 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) rt_sigaction(0x400000000000007, &(0x7f0000000000)={0x40040b, {0xffffffbfffbff270}}, &(0x7f0000000080), 0x8, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044032, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000001100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x2) ioctl$TIOCNXCL(r1, 0x540d) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4002, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:57 executing program 4 (fault-call:2 fault-nth:12): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x1) bind$vsock_stream(r2, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) [ 532.668573] FAULT_INJECTION: forcing a failure. [ 532.668573] name failslab, interval 1, probability 0, space 0, times 0 [ 532.680023] CPU: 0 PID: 30076 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 532.687388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.696737] Call Trace: [ 532.699339] dump_stack+0x1c9/0x2b4 [ 532.702981] ? dump_stack_print_info.cold.2+0x52/0x52 [ 532.708186] ? __save_stack_trace+0x8d/0xf0 [ 532.712526] should_fail.cold.4+0xa/0x1a [ 532.716603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 532.721719] ? save_stack+0x43/0xd0 [ 532.725353] ? kasan_kmalloc+0xc4/0xe0 [ 532.729246] ? kmem_cache_alloc_trace+0x152/0x780 [ 532.734098] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 532.739309] ? __list_lru_init+0x46a/0x7c0 [ 532.743550] ? sget_userns+0x755/0xf20 [ 532.747451] ? graph_lock+0x170/0x170 [ 532.751255] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 532.756016] ? do_mount+0x581/0x30e0 [ 532.759731] ? ksys_mount+0x12d/0x140 [ 532.763536] ? __x64_sys_mount+0xbe/0x150 [ 532.767691] ? do_syscall_64+0x1b9/0x820 [ 532.771756] ? find_held_lock+0x36/0x1c0 [ 532.775820] ? __lock_is_held+0xb5/0x140 [ 532.779893] ? check_same_owner+0x340/0x340 [ 532.784217] ? rcu_note_context_switch+0x730/0x730 [ 532.789155] __should_failslab+0x124/0x180 [ 532.793397] should_failslab+0x9/0x14 [ 532.797201] kmem_cache_alloc_trace+0x2cb/0x780 [ 532.801869] ? __kmalloc_node+0x33/0x70 [ 532.805843] ? __kmalloc_node+0x33/0x70 [ 532.809824] ? rcu_read_lock_sched_held+0x108/0x120 11:47:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643ddb1f2cae3a12d2f95f9d44be827dcd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x4, 0x18, 0x178}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x10000}, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000080)=""/63) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) [ 532.814847] __memcg_init_list_lru_node+0x185/0x2d0 [ 532.819871] ? kvfree_rcu+0x20/0x20 [ 532.823509] ? __kmalloc_node+0x47/0x70 [ 532.827502] __list_lru_init+0x46a/0x7c0 [ 532.831579] ? list_lru_destroy+0x4d0/0x4d0 [ 532.835914] ? __lockdep_init_map+0x105/0x590 [ 532.840420] ? __init_waitqueue_head+0x9e/0x150 [ 532.843057] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 532.845089] ? init_wait_entry+0x1c0/0x1c0 [ 532.845106] ? __lockdep_init_map+0x105/0x590 [ 532.845131] sget_userns+0x755/0xf20 [ 532.845145] ? get_anon_bdev+0x300/0x300 [ 532.845166] ? destroy_unused_super.part.11+0x110/0x110 [ 532.845185] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 532.880973] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 532.886003] ? cap_capable+0x1f9/0x260 [ 532.889901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.895528] ? security_capable+0x99/0xc0 [ 532.899705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.905274] ? ns_capable_common+0x13f/0x170 [ 532.909691] ? get_anon_bdev+0x300/0x300 [ 532.913743] sget+0x10b/0x150 [ 532.916844] ? fuse_get_root_inode+0x1b0/0x1b0 [ 532.921420] mount_nodev+0x33/0x110 [ 532.925043] fuse_mount+0x2c/0x40 [ 532.928489] mount_fs+0xae/0x328 [ 532.931846] vfs_kern_mount.part.34+0xdc/0x4e0 [ 532.936416] ? may_umount+0xb0/0xb0 [ 532.940038] ? _raw_read_unlock+0x22/0x30 [ 532.944174] ? __get_fs_type+0x97/0xc0 [ 532.948057] do_mount+0x581/0x30e0 [ 532.951587] ? do_raw_spin_unlock+0xa7/0x2f0 [ 532.955987] ? copy_mount_string+0x40/0x40 [ 532.960221] ? copy_mount_options+0x5f/0x380 [ 532.964631] ? rcu_read_lock_sched_held+0x108/0x120 [ 532.969636] ? kmem_cache_alloc_trace+0x616/0x780 [ 532.974470] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.980003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.985536] ? copy_mount_options+0x285/0x380 [ 532.990041] ksys_mount+0x12d/0x140 [ 532.993657] __x64_sys_mount+0xbe/0x150 [ 532.997618] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 533.002622] do_syscall_64+0x1b9/0x820 [ 533.006495] ? finish_task_switch+0x1d3/0x870 [ 533.010977] ? syscall_return_slowpath+0x5e0/0x5e0 [ 533.015893] ? syscall_return_slowpath+0x31d/0x5e0 [ 533.020817] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 533.026172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 533.031010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.036193] RIP: 0033:0x455a79 [ 533.039372] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.058701] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 11:47:58 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7a00000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 533.066398] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 533.073651] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 533.080903] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 533.088155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 533.095411] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000000c 11:47:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000040)) 11:47:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_WRITE(r0, &(0x7f00000001c0)={0x18, 0x0, 0x3, {0x6}}, 0x18) read$FUSE(r0, &(0x7f0000001000), 0x131b) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x2}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 533.155628] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:58 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x3f00000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00 \x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1f, 0x4200) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000000c0)) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:58 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x6800000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) [ 533.310652] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 533.375260] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:47:58 executing program 4 (fault-call:2 fault-nth:13): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:58 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x3) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") flock(r0, 0x5) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:47:58 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xe087, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 533.543557] FAULT_INJECTION: forcing a failure. [ 533.543557] name failslab, interval 1, probability 0, space 0, times 0 [ 533.554903] CPU: 1 PID: 30132 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 533.562260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.571602] Call Trace: [ 533.574188] dump_stack+0x1c9/0x2b4 [ 533.577817] ? dump_stack_print_info.cold.2+0x52/0x52 [ 533.583009] ? __save_stack_trace+0x8d/0xf0 [ 533.587345] should_fail.cold.4+0xa/0x1a [ 533.591409] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 533.596510] ? save_stack+0x43/0xd0 [ 533.600134] ? kasan_kmalloc+0xc4/0xe0 [ 533.604022] ? kmem_cache_alloc_trace+0x152/0x780 [ 533.608865] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 533.614067] ? __list_lru_init+0x46a/0x7c0 [ 533.618307] ? sget_userns+0x755/0xf20 [ 533.622196] ? graph_lock+0x170/0x170 [ 533.625997] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 533.630761] ? do_mount+0x581/0x30e0 [ 533.634476] ? ksys_mount+0x12d/0x140 [ 533.638275] ? __x64_sys_mount+0xbe/0x150 [ 533.642426] ? do_syscall_64+0x1b9/0x820 [ 533.646493] ? find_held_lock+0x36/0x1c0 [ 533.650567] ? __lock_is_held+0xb5/0x140 [ 533.654647] ? check_same_owner+0x340/0x340 [ 533.659007] ? rcu_note_context_switch+0x730/0x730 [ 533.663949] __should_failslab+0x124/0x180 [ 533.668200] should_failslab+0x9/0x14 [ 533.672010] kmem_cache_alloc_trace+0x2cb/0x780 [ 533.676680] ? __kmalloc_node+0x33/0x70 [ 533.680654] ? __kmalloc_node+0x33/0x70 [ 533.684627] ? rcu_read_lock_sched_held+0x108/0x120 [ 533.689644] __memcg_init_list_lru_node+0x185/0x2d0 [ 533.694658] ? kvfree_rcu+0x20/0x20 [ 533.698286] ? __kmalloc_node+0x47/0x70 [ 533.702266] __list_lru_init+0x46a/0x7c0 [ 533.706326] ? list_lru_destroy+0x4d0/0x4d0 [ 533.710647] ? __lockdep_init_map+0x105/0x590 [ 533.715142] ? __init_waitqueue_head+0x9e/0x150 [ 533.719808] ? init_wait_entry+0x1c0/0x1c0 [ 533.724039] ? __lockdep_init_map+0x105/0x590 [ 533.728540] sget_userns+0x755/0xf20 [ 533.732249] ? get_anon_bdev+0x300/0x300 [ 533.736318] ? destroy_unused_super.part.11+0x110/0x110 [ 533.741680] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 533.746532] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 533.751557] ? cap_capable+0x1f9/0x260 [ 533.755449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.761069] ? security_capable+0x99/0xc0 [ 533.765217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.770753] ? ns_capable_common+0x13f/0x170 [ 533.775160] ? get_anon_bdev+0x300/0x300 [ 533.779217] sget+0x10b/0x150 [ 533.782324] ? fuse_get_root_inode+0x1b0/0x1b0 [ 533.786907] mount_nodev+0x33/0x110 [ 533.790534] fuse_mount+0x2c/0x40 [ 533.793985] mount_fs+0xae/0x328 [ 533.797353] vfs_kern_mount.part.34+0xdc/0x4e0 [ 533.801936] ? may_umount+0xb0/0xb0 [ 533.805561] ? _raw_read_unlock+0x22/0x30 [ 533.809707] ? __get_fs_type+0x97/0xc0 [ 533.813597] do_mount+0x581/0x30e0 [ 533.817155] ? copy_mount_string+0x40/0x40 [ 533.821395] ? copy_mount_options+0x5f/0x380 [ 533.825802] ? rcu_read_lock_sched_held+0x108/0x120 [ 533.830817] ? kmem_cache_alloc_trace+0x616/0x780 [ 533.835660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 533.841198] ? _copy_from_user+0xdf/0x150 [ 533.845346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.850882] ? copy_mount_options+0x285/0x380 [ 533.855383] ksys_mount+0x12d/0x140 [ 533.859010] __x64_sys_mount+0xbe/0x150 [ 533.862984] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 533.868000] do_syscall_64+0x1b9/0x820 [ 533.871884] ? finish_task_switch+0x1d3/0x870 [ 533.876376] ? syscall_return_slowpath+0x5e0/0x5e0 [ 533.881306] ? syscall_return_slowpath+0x31d/0x5e0 [ 533.886255] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 533.891623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 533.896469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.901652] RIP: 0033:0x455a79 [ 533.904832] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.924194] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 533.931911] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 533.939173] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 533.946435] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 533.953702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 533.960977] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000000d 11:47:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4004, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:59 executing program 4 (fault-call:2 fault-nth:14): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:59 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x900000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000100)=""/181) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffff9c, 0x5382, &(0x7f0000000080)) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 11:47:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='nodev\x00', 0xffffffffffffff9c}, 0x10) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000001c0)=0x1ff, 0x4) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:47:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000180)=0x1c, 0x80800) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 534.059005] FAULT_INJECTION: forcing a failure. [ 534.059005] name failslab, interval 1, probability 0, space 0, times 0 [ 534.070356] CPU: 0 PID: 30153 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 534.076291] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 534.077711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.077717] Call Trace: [ 534.077742] dump_stack+0x1c9/0x2b4 [ 534.077763] ? dump_stack_print_info.cold.2+0x52/0x52 [ 534.077785] ? __save_stack_trace+0x8d/0xf0 [ 534.111983] should_fail.cold.4+0xa/0x1a [ 534.116054] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 534.121173] ? save_stack+0x43/0xd0 [ 534.124809] ? kasan_kmalloc+0xc4/0xe0 [ 534.128704] ? kmem_cache_alloc_trace+0x152/0x780 [ 534.133552] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 534.138747] ? __list_lru_init+0x46a/0x7c0 [ 534.139878] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 534.142986] ? sget_userns+0x755/0xf20 [ 534.143008] ? graph_lock+0x170/0x170 [ 534.143027] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 534.143044] ? do_mount+0x581/0x30e0 [ 534.143062] ? ksys_mount+0x12d/0x140 [ 534.172096] ? __x64_sys_mount+0xbe/0x150 [ 534.176244] ? do_syscall_64+0x1b9/0x820 [ 534.180309] ? find_held_lock+0x36/0x1c0 [ 534.184374] ? __lock_is_held+0xb5/0x140 [ 534.188450] ? check_same_owner+0x340/0x340 [ 534.192774] ? rcu_note_context_switch+0x730/0x730 [ 534.197714] __should_failslab+0x124/0x180 [ 534.201955] should_failslab+0x9/0x14 [ 534.205777] kmem_cache_alloc_trace+0x2cb/0x780 [ 534.210444] ? __kmalloc_node+0x33/0x70 [ 534.214420] ? __kmalloc_node+0x33/0x70 [ 534.218405] ? rcu_read_lock_sched_held+0x108/0x120 [ 534.223430] __memcg_init_list_lru_node+0x185/0x2d0 [ 534.228450] ? kvfree_rcu+0x20/0x20 [ 534.232079] ? __kmalloc_node+0x47/0x70 [ 534.236057] __list_lru_init+0x46a/0x7c0 [ 534.240121] ? list_lru_destroy+0x4d0/0x4d0 [ 534.244446] ? __lockdep_init_map+0x105/0x590 [ 534.248945] ? __init_waitqueue_head+0x9e/0x150 [ 534.253623] ? init_wait_entry+0x1c0/0x1c0 [ 534.257857] ? __lockdep_init_map+0x105/0x590 [ 534.262363] sget_userns+0x755/0xf20 [ 534.266072] ? get_anon_bdev+0x300/0x300 [ 534.270143] ? destroy_unused_super.part.11+0x110/0x110 [ 534.275512] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 534.280360] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 534.285387] ? cap_capable+0x1f9/0x260 [ 534.289289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.294829] ? security_capable+0x99/0xc0 [ 534.298981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.304517] ? ns_capable_common+0x13f/0x170 [ 534.308925] ? get_anon_bdev+0x300/0x300 [ 534.312988] sget+0x10b/0x150 [ 534.316099] ? fuse_get_root_inode+0x1b0/0x1b0 [ 534.320682] mount_nodev+0x33/0x110 [ 534.324312] fuse_mount+0x2c/0x40 [ 534.327764] mount_fs+0xae/0x328 [ 534.331135] vfs_kern_mount.part.34+0xdc/0x4e0 [ 534.335719] ? may_umount+0xb0/0xb0 [ 534.339349] ? _raw_read_unlock+0x22/0x30 [ 534.343495] ? __get_fs_type+0x97/0xc0 [ 534.347386] do_mount+0x581/0x30e0 [ 534.350928] ? do_raw_spin_unlock+0xa7/0x2f0 [ 534.355340] ? copy_mount_string+0x40/0x40 [ 534.359582] ? copy_mount_options+0x5f/0x380 [ 534.363993] ? rcu_read_lock_sched_held+0x108/0x120 [ 534.369007] ? kmem_cache_alloc_trace+0x616/0x780 [ 534.373858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 534.379404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.384942] ? copy_mount_options+0x285/0x380 [ 534.389443] ksys_mount+0x12d/0x140 [ 534.393071] __x64_sys_mount+0xbe/0x150 [ 534.397046] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 534.402065] do_syscall_64+0x1b9/0x820 [ 534.405949] ? finish_task_switch+0x1d3/0x870 [ 534.410446] ? syscall_return_slowpath+0x5e0/0x5e0 [ 534.415376] ? syscall_return_slowpath+0x31d/0x5e0 [ 534.420314] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 534.425680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 534.430528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.435711] RIP: 0033:0x455a79 [ 534.438889] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.458264] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 534.465977] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 534.473246] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 534.480515] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 534.487779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 534.495048] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000000e 11:47:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x1, 0x400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x0, {0x8, 0x3, "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", 0x48, 0x1, 0x1, 0xffffffffffffffc1, 0x2, 0x0, 0x8}, r1}}, 0x128) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7fa32d3495edd5c95a060000003b6bf6d359cf9f563e07a9002c159d0ced767b524cc43cca4c0656e810b86078c0ee5e3f12facccd7cd086712c57f81588aa9a1283e96bc611354f76c40a050b8e72e4b5a8b9ad3d866444b5174ec3656855f9", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000001000), 0xffffffffffffffbf) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x2, 0x1, {0x7, 0x1b, 0x44fc}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) r3 = accept(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000240)={0x1, 0x1, 0xffffffffffffffe0, 0x800, 0x70fe0080, 0xa80f, 0x7, 0x400, 0x982a, 0xff, 0x54}, 0xb) 11:47:59 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x87e00000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000100", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:47:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f00000000c0)=0x200) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xc0081, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000080)={0x3b, ""/59}) ioctl(r0, 0x8918, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:47:59 executing program 4 (fault-call:2 fault-nth:15): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 534.585215] FAULT_INJECTION: forcing a failure. [ 534.585215] name failslab, interval 1, probability 0, space 0, times 0 [ 534.596501] CPU: 0 PID: 30168 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 534.603865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.613217] Call Trace: [ 534.615813] dump_stack+0x1c9/0x2b4 [ 534.619459] ? dump_stack_print_info.cold.2+0x52/0x52 [ 534.624665] ? __save_stack_trace+0x8d/0xf0 [ 534.629009] should_fail.cold.4+0xa/0x1a [ 534.633094] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 534.638211] ? save_stack+0x43/0xd0 [ 534.641853] ? kasan_kmalloc+0xc4/0xe0 [ 534.645748] ? kmem_cache_alloc_trace+0x152/0x780 [ 534.650600] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 534.655795] ? __list_lru_init+0x46a/0x7c0 [ 534.660038] ? sget_userns+0x755/0xf20 [ 534.663933] ? graph_lock+0x170/0x170 [ 534.667737] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 534.672496] ? do_mount+0x581/0x30e0 [ 534.676214] ? ksys_mount+0x12d/0x140 [ 534.680020] ? __x64_sys_mount+0xbe/0x150 [ 534.684179] ? do_syscall_64+0x1b9/0x820 [ 534.688252] ? find_held_lock+0x36/0x1c0 [ 534.692332] ? __lock_is_held+0xb5/0x140 [ 534.696417] ? check_same_owner+0x340/0x340 [ 534.700746] ? rcu_note_context_switch+0x730/0x730 [ 534.705681] __should_failslab+0x124/0x180 [ 534.709922] should_failslab+0x9/0x14 [ 534.713722] kmem_cache_alloc_trace+0x2cb/0x780 [ 534.718394] ? __kmalloc_node+0x33/0x70 [ 534.722370] ? __kmalloc_node+0x33/0x70 [ 534.726354] ? rcu_read_lock_sched_held+0x108/0x120 [ 534.731380] __memcg_init_list_lru_node+0x185/0x2d0 [ 534.736400] ? kvfree_rcu+0x20/0x20 [ 534.740030] ? __kmalloc_node+0x47/0x70 [ 534.744015] __list_lru_init+0x46a/0x7c0 [ 534.748086] ? list_lru_destroy+0x4d0/0x4d0 [ 534.752421] ? __lockdep_init_map+0x105/0x590 [ 534.754314] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 534.756919] ? __init_waitqueue_head+0x9e/0x150 [ 534.756934] ? init_wait_entry+0x1c0/0x1c0 [ 534.756950] ? __lockdep_init_map+0x105/0x590 [ 534.756976] sget_userns+0x755/0xf20 [ 534.756990] ? get_anon_bdev+0x300/0x300 [ 534.757014] ? destroy_unused_super.part.11+0x110/0x110 [ 534.757030] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 534.757049] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 534.802488] ? cap_capable+0x1f9/0x260 [ 534.806392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.808359] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 534.811931] ? security_capable+0x99/0xc0 [ 534.811952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.811970] ? ns_capable_common+0x13f/0x170 [ 534.811989] ? get_anon_bdev+0x300/0x300 [ 534.812004] sget+0x10b/0x150 [ 534.812024] ? fuse_get_root_inode+0x1b0/0x1b0 [ 534.812040] mount_nodev+0x33/0x110 [ 534.812057] fuse_mount+0x2c/0x40 [ 534.812072] mount_fs+0xae/0x328 [ 534.812092] vfs_kern_mount.part.34+0xdc/0x4e0 [ 534.861970] ? may_umount+0xb0/0xb0 [ 534.865599] ? _raw_read_unlock+0x22/0x30 [ 534.869741] ? __get_fs_type+0x97/0xc0 [ 534.874065] do_mount+0x581/0x30e0 [ 534.877601] ? copy_mount_string+0x40/0x40 [ 534.881854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.886608] ? retint_kernel+0x10/0x10 [ 534.890500] ? copy_mount_options+0x1a1/0x380 [ 534.894984] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 534.899818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.905341] ? copy_mount_options+0x285/0x380 [ 534.909836] ksys_mount+0x12d/0x140 [ 534.913453] __x64_sys_mount+0xbe/0x150 [ 534.917414] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 534.922416] do_syscall_64+0x1b9/0x820 [ 534.926290] ? finish_task_switch+0x1d3/0x870 [ 534.930777] ? syscall_return_slowpath+0x5e0/0x5e0 [ 534.935693] ? syscall_return_slowpath+0x31d/0x5e0 [ 534.940614] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 534.945971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 534.950817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.955992] RIP: 0033:0x455a79 [ 534.959168] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.978494] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 11:47:59 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400102, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) r0 = memfd_create(&(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x0) mkdirat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x58) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setns(r2, 0x40000000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030301e303030303030303030303034303030b255000000000000643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x1f) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:47:59 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xf0ffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000040)={0x0, 0x10000000000000, 0xffffffffffffffff}) [ 534.986190] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 534.993446] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 535.000701] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 535.007953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 535.015209] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 000000000000000f 11:48:00 executing program 4 (fault-call:2 fault-nth:16): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 535.141905] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 535.149836] FAULT_INJECTION: forcing a failure. [ 535.149836] name failslab, interval 1, probability 0, space 0, times 0 [ 535.162461] CPU: 1 PID: 30196 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 535.169825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.179179] Call Trace: [ 535.181772] dump_stack+0x1c9/0x2b4 [ 535.182374] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 535.185414] ? dump_stack_print_info.cold.2+0x52/0x52 [ 535.185437] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 535.185452] ? __save_stack_trace+0x8d/0xf0 [ 535.185478] should_fail.cold.4+0xa/0x1a [ 535.213467] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 535.218588] ? save_stack+0x43/0xd0 [ 535.222221] ? kasan_kmalloc+0xc4/0xe0 [ 535.226110] ? kmem_cache_alloc_trace+0x152/0x780 [ 535.230960] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 535.236150] ? __list_lru_init+0x46a/0x7c0 [ 535.240389] ? sget_userns+0x755/0xf20 [ 535.244279] ? graph_lock+0x170/0x170 [ 535.248084] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 535.252847] ? do_mount+0x581/0x30e0 [ 535.256558] ? ksys_mount+0x12d/0x140 [ 535.260363] ? __x64_sys_mount+0xbe/0x150 [ 535.264515] ? find_held_lock+0x36/0x1c0 [ 535.268584] ? __lock_is_held+0xb5/0x140 [ 535.272658] ? check_same_owner+0x340/0x340 [ 535.276981] ? rcu_note_context_switch+0x730/0x730 [ 535.281914] __should_failslab+0x124/0x180 [ 535.286152] should_failslab+0x9/0x14 [ 535.289954] kmem_cache_alloc_trace+0x2cb/0x780 [ 535.294628] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 535.299649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 535.304424] __memcg_init_list_lru_node+0x185/0x2d0 [ 535.309441] ? kvfree_rcu+0x20/0x20 [ 535.313074] ? kvmalloc_node+0x6d/0xf0 [ 535.316967] __list_lru_init+0x46a/0x7c0 [ 535.321032] ? list_lru_destroy+0x4d0/0x4d0 [ 535.325354] ? __lockdep_init_map+0x105/0x590 [ 535.329853] ? __init_waitqueue_head+0x9e/0x150 [ 535.334526] ? init_wait_entry+0x1c0/0x1c0 [ 535.338765] ? __lockdep_init_map+0x105/0x590 [ 535.343270] sget_userns+0x755/0xf20 [ 535.346983] ? get_anon_bdev+0x300/0x300 [ 535.351049] ? destroy_unused_super.part.11+0x110/0x110 [ 535.356414] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 535.361262] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 535.366288] ? cap_capable+0x1f9/0x260 [ 535.370183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.375717] ? security_capable+0x99/0xc0 [ 535.379869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.385413] ? ns_capable_common+0x13f/0x170 [ 535.389825] ? get_anon_bdev+0x300/0x300 [ 535.393883] sget+0x10b/0x150 [ 535.396996] ? fuse_get_root_inode+0x1b0/0x1b0 [ 535.401580] mount_nodev+0x33/0x110 [ 535.405210] fuse_mount+0x2c/0x40 [ 535.408663] mount_fs+0xae/0x328 [ 535.412038] vfs_kern_mount.part.34+0xdc/0x4e0 [ 535.416622] ? may_umount+0xb0/0xb0 [ 535.420247] ? _raw_read_unlock+0x22/0x30 [ 535.424392] ? __get_fs_type+0x97/0xc0 [ 535.428283] do_mount+0x581/0x30e0 [ 535.431827] ? copy_mount_string+0x40/0x40 [ 535.436070] ? copy_mount_options+0x5f/0x380 [ 535.440478] ? rcu_read_lock_sched_held+0x108/0x120 [ 535.445496] ? kmem_cache_alloc_trace+0x616/0x780 [ 535.450340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 535.455881] ? _copy_from_user+0xdf/0x150 [ 535.460030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.465568] ? copy_mount_options+0x285/0x380 [ 535.470064] ksys_mount+0x12d/0x140 [ 535.473694] __x64_sys_mount+0xbe/0x150 [ 535.477680] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 535.482698] do_syscall_64+0x1b9/0x820 [ 535.486582] ? finish_task_switch+0x1d3/0x870 [ 535.491076] ? syscall_return_slowpath+0x5e0/0x5e0 [ 535.496006] ? syscall_return_slowpath+0x31d/0x5e0 [ 535.500943] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 535.506310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 535.511161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.516349] RIP: 0033:0x455a79 [ 535.519529] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.538940] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 535.546652] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 535.553919] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 535.561183] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 535.568449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 535.575711] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000010 11:48:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x4000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:00 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xc, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67e168aa2bbada3224", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:48:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) 11:48:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x2, 0x3, 0x10001}}, 0x28) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:00 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x68, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cc950cbed88ab680f4e0ed0258de1bf14e18e3f6900cf52c2b5fb2a9a171934b150f5553f11b9ff298448dda01b4fc9c2684779fd5e59e7505c63e6b415a1"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:48:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x100000001) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:48:00 executing program 4 (fault-call:2 fault-nth:17): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 535.729646] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 535.801646] FAULT_INJECTION: forcing a failure. [ 535.801646] name failslab, interval 1, probability 0, space 0, times 0 [ 535.813089] CPU: 1 PID: 30229 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 535.820447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.829793] Call Trace: [ 535.832386] dump_stack+0x1c9/0x2b4 [ 535.836017] ? dump_stack_print_info.cold.2+0x52/0x52 [ 535.841209] ? __save_stack_trace+0x8d/0xf0 [ 535.845545] should_fail.cold.4+0xa/0x1a [ 535.849609] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 535.854716] ? save_stack+0x43/0xd0 [ 535.858343] ? kasan_kmalloc+0xc4/0xe0 [ 535.862231] ? kmem_cache_alloc_trace+0x152/0x780 [ 535.867072] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 535.872257] ? __list_lru_init+0x46a/0x7c0 [ 535.876487] ? sget_userns+0x755/0xf20 [ 535.880377] ? graph_lock+0x170/0x170 [ 535.884175] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 535.888927] ? do_mount+0x581/0x30e0 [ 535.892638] ? ksys_mount+0x12d/0x140 [ 535.896434] ? __x64_sys_mount+0xbe/0x150 [ 535.900600] ? do_syscall_64+0x1b9/0x820 [ 535.904672] ? find_held_lock+0x36/0x1c0 [ 535.908741] ? __lock_is_held+0xb5/0x140 [ 535.912816] ? check_same_owner+0x340/0x340 [ 535.917140] ? rcu_note_context_switch+0x730/0x730 [ 535.922072] __should_failslab+0x124/0x180 [ 535.926309] should_failslab+0x9/0x14 [ 535.930112] kmem_cache_alloc_trace+0x2cb/0x780 [ 535.934783] ? __kmalloc_node+0x33/0x70 [ 535.938753] ? __kmalloc_node+0x33/0x70 [ 535.942727] ? rcu_read_lock_sched_held+0x108/0x120 [ 535.947745] __memcg_init_list_lru_node+0x185/0x2d0 [ 535.952760] ? kvfree_rcu+0x20/0x20 [ 535.956386] ? __kmalloc_node+0x47/0x70 [ 535.960367] __list_lru_init+0x46a/0x7c0 [ 535.964428] ? list_lru_destroy+0x4d0/0x4d0 [ 535.968749] ? __lockdep_init_map+0x105/0x590 [ 535.973243] ? __init_waitqueue_head+0x9e/0x150 [ 535.977917] ? init_wait_entry+0x1c0/0x1c0 [ 535.982151] ? __lockdep_init_map+0x105/0x590 [ 535.986653] sget_userns+0x755/0xf20 [ 535.990366] ? get_anon_bdev+0x300/0x300 [ 535.994434] ? destroy_unused_super.part.11+0x110/0x110 [ 535.999797] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 536.004642] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 536.009664] ? cap_capable+0x1f9/0x260 [ 536.013556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.019092] ? security_capable+0x99/0xc0 [ 536.023242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.028780] ? ns_capable_common+0x13f/0x170 [ 536.033191] ? get_anon_bdev+0x300/0x300 [ 536.037247] sget+0x10b/0x150 [ 536.040359] ? fuse_get_root_inode+0x1b0/0x1b0 [ 536.044940] mount_nodev+0x33/0x110 [ 536.048570] fuse_mount+0x2c/0x40 [ 536.052020] mount_fs+0xae/0x328 [ 536.055390] vfs_kern_mount.part.34+0xdc/0x4e0 [ 536.059971] ? may_umount+0xb0/0xb0 [ 536.063599] ? _raw_read_unlock+0x22/0x30 [ 536.067741] ? __get_fs_type+0x97/0xc0 [ 536.071630] do_mount+0x581/0x30e0 [ 536.075171] ? do_raw_spin_unlock+0xa7/0x2f0 [ 536.079584] ? copy_mount_string+0x40/0x40 [ 536.083826] ? copy_mount_options+0x5f/0x380 [ 536.088232] ? rcu_read_lock_sched_held+0x108/0x120 [ 536.093247] ? kmem_cache_alloc_trace+0x616/0x780 [ 536.098090] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 536.103633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.109170] ? copy_mount_options+0x285/0x380 [ 536.113664] ksys_mount+0x12d/0x140 [ 536.117291] __x64_sys_mount+0xbe/0x150 [ 536.121262] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 536.126278] do_syscall_64+0x1b9/0x820 [ 536.130165] ? finish_task_switch+0x1d3/0x870 [ 536.134658] ? syscall_return_slowpath+0x5e0/0x5e0 [ 536.139586] ? syscall_return_slowpath+0x31d/0x5e0 [ 536.144526] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 536.149892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 536.154742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.159925] RIP: 0033:0x455a79 [ 536.163103] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 536.182473] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 536.190187] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 11:48:01 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xffffffff87e00000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 536.197448] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 536.204712] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 536.211975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 536.219237] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000011 [ 536.228357] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:48:01 executing program 4 (fault-call:2 fault-nth:18): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl(r0, 0x3a, &(0x7f0000000180)="3ff1dfa5e847e1613e31d943d2d7964cdb09d06cbd99710d049ca9382ba0c5436cc8248268ceb9ebda3ef7fe615fd96b94929f8fff3b7c2cfe") write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'veth0_to_team\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:48:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0xd8191af4db48ae51, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x40000000003}) 11:48:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174007fffffff00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 536.332514] FAULT_INJECTION: forcing a failure. [ 536.332514] name failslab, interval 1, probability 0, space 0, times 0 [ 536.343844] CPU: 0 PID: 30240 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 536.351205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.360560] Call Trace: [ 536.363162] dump_stack+0x1c9/0x2b4 [ 536.366802] ? dump_stack_print_info.cold.2+0x52/0x52 [ 536.372005] ? __save_stack_trace+0x8d/0xf0 [ 536.376350] should_fail.cold.4+0xa/0x1a [ 536.380433] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 536.385550] ? save_stack+0x43/0xd0 [ 536.389178] ? kasan_kmalloc+0xc4/0xe0 [ 536.393067] ? kmem_cache_alloc_trace+0x152/0x780 [ 536.397908] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 536.403093] ? __list_lru_init+0x46a/0x7c0 [ 536.407324] ? sget_userns+0x755/0xf20 [ 536.411211] ? graph_lock+0x170/0x170 [ 536.415016] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 536.419775] ? do_mount+0x581/0x30e0 [ 536.423486] ? ksys_mount+0x12d/0x140 [ 536.427283] ? __x64_sys_mount+0xbe/0x150 [ 536.431438] ? do_syscall_64+0x1b9/0x820 [ 536.435518] ? find_held_lock+0x36/0x1c0 [ 536.439590] ? __lock_is_held+0xb5/0x140 [ 536.443669] ? check_same_owner+0x340/0x340 [ 536.447999] ? rcu_note_context_switch+0x730/0x730 [ 536.452941] __should_failslab+0x124/0x180 [ 536.457190] should_failslab+0x9/0x14 [ 536.460999] kmem_cache_alloc_trace+0x2cb/0x780 [ 536.465676] ? __kmalloc_node+0x33/0x70 [ 536.469656] ? __kmalloc_node+0x33/0x70 [ 536.473642] ? rcu_read_lock_sched_held+0x108/0x120 [ 536.478667] __memcg_init_list_lru_node+0x185/0x2d0 [ 536.483687] ? kvfree_rcu+0x20/0x20 [ 536.487318] ? __kmalloc_node+0x47/0x70 [ 536.491300] __list_lru_init+0x46a/0x7c0 [ 536.495372] ? list_lru_destroy+0x4d0/0x4d0 [ 536.499707] ? __lockdep_init_map+0x105/0x590 [ 536.504211] ? __init_waitqueue_head+0x9e/0x150 [ 536.508881] ? init_wait_entry+0x1c0/0x1c0 [ 536.513116] ? __lockdep_init_map+0x105/0x590 [ 536.517622] sget_userns+0x755/0xf20 [ 536.521333] ? get_anon_bdev+0x300/0x300 [ 536.525403] ? destroy_unused_super.part.11+0x110/0x110 [ 536.530774] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 536.535622] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 536.540645] ? cap_capable+0x1f9/0x260 [ 536.544538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.550084] ? security_capable+0x99/0xc0 [ 536.554242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.559784] ? ns_capable_common+0x13f/0x170 [ 536.564194] ? get_anon_bdev+0x300/0x300 [ 536.568251] sget+0x10b/0x150 [ 536.571358] ? fuse_get_root_inode+0x1b0/0x1b0 [ 536.575981] mount_nodev+0x33/0x110 [ 536.579608] fuse_mount+0x2c/0x40 [ 536.583068] mount_fs+0xae/0x328 [ 536.586440] vfs_kern_mount.part.34+0xdc/0x4e0 [ 536.591026] ? may_umount+0xb0/0xb0 [ 536.594654] ? _raw_read_unlock+0x22/0x30 [ 536.598798] ? __get_fs_type+0x97/0xc0 [ 536.602689] do_mount+0x581/0x30e0 [ 536.606233] ? copy_mount_string+0x40/0x40 [ 536.610478] ? copy_mount_options+0x5f/0x380 [ 536.614890] ? rcu_read_lock_sched_held+0x108/0x120 [ 536.619908] ? kmem_cache_alloc_trace+0x616/0x780 [ 536.624764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 536.630303] ? _copy_from_user+0xdf/0x150 [ 536.634461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.634908] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 536.639995] ? copy_mount_options+0x285/0x380 [ 536.640016] ksys_mount+0x12d/0x140 [ 536.640035] __x64_sys_mount+0xbe/0x150 [ 536.640052] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 536.640072] do_syscall_64+0x1b9/0x820 [ 536.640086] ? finish_task_switch+0x1d3/0x870 [ 536.640103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 536.640117] ? syscall_return_slowpath+0x31d/0x5e0 [ 536.640138] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 536.689819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 536.694651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.699824] RIP: 0033:0x455a79 [ 536.702990] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 536.722222] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 536.729911] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 536.737164] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 536.744415] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 536.751664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 536.758916] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000012 11:48:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:01 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x748d0100, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x3, 0x9, 0x81}) 11:48:01 executing program 4 (fault-call:2 fault-nth:19): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 536.789104] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 536.844211] FAULT_INJECTION: forcing a failure. [ 536.844211] name failslab, interval 1, probability 0, space 0, times 0 [ 536.855518] CPU: 0 PID: 30268 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 536.862877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.872220] Call Trace: [ 536.874815] dump_stack+0x1c9/0x2b4 [ 536.878446] ? dump_stack_print_info.cold.2+0x52/0x52 [ 536.883649] should_fail.cold.4+0xa/0x1a [ 536.887719] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 536.892827] ? print_usage_bug+0xc0/0xc0 [ 536.896889] ? graph_lock+0x170/0x170 [ 536.900715] ? lock_downgrade+0x8f0/0x8f0 [ 536.904886] ? find_held_lock+0x36/0x1c0 [ 536.908951] ? __lock_is_held+0xb5/0x140 [ 536.913003] ? check_same_owner+0x340/0x340 [ 536.917314] ? rcu_note_context_switch+0x730/0x730 [ 536.922230] __should_failslab+0x124/0x180 [ 536.926448] should_failslab+0x9/0x14 [ 536.930234] __kmalloc+0x2c8/0x760 [ 536.933758] ? kvfree_rcu+0x20/0x20 [ 536.937367] ? __list_lru_init+0xe5/0x7c0 [ 536.941499] __list_lru_init+0xe5/0x7c0 [ 536.945460] ? list_lru_destroy+0x4d0/0x4d0 [ 536.949771] ? __lockdep_init_map+0x105/0x590 [ 536.954254] ? __init_waitqueue_head+0x9e/0x150 [ 536.958906] ? init_wait_entry+0x1c0/0x1c0 [ 536.963135] sget_userns+0x782/0xf20 [ 536.966833] ? get_anon_bdev+0x300/0x300 [ 536.970883] ? destroy_unused_super.part.11+0x110/0x110 [ 536.976233] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 536.981064] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 536.986070] ? cap_capable+0x1f9/0x260 [ 536.989959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.995480] ? security_capable+0x99/0xc0 [ 536.999616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.005151] ? ns_capable_common+0x13f/0x170 [ 537.009547] ? get_anon_bdev+0x300/0x300 [ 537.013595] sget+0x10b/0x150 [ 537.016690] ? fuse_get_root_inode+0x1b0/0x1b0 [ 537.021257] mount_nodev+0x33/0x110 [ 537.024872] fuse_mount+0x2c/0x40 [ 537.028311] mount_fs+0xae/0x328 [ 537.031667] vfs_kern_mount.part.34+0xdc/0x4e0 [ 537.036235] ? may_umount+0xb0/0xb0 [ 537.039845] ? _raw_read_unlock+0x22/0x30 [ 537.043976] ? __get_fs_type+0x97/0xc0 [ 537.047852] do_mount+0x581/0x30e0 [ 537.051391] ? copy_mount_string+0x40/0x40 [ 537.055615] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.060359] ? retint_kernel+0x10/0x10 [ 537.064236] ? copy_mount_options+0x1f0/0x380 [ 537.068716] ? copy_mount_options+0x200/0x380 [ 537.073193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.078714] ? copy_mount_options+0x285/0x380 [ 537.083196] ksys_mount+0x12d/0x140 [ 537.086810] __x64_sys_mount+0xbe/0x150 [ 537.090772] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 537.095774] do_syscall_64+0x1b9/0x820 [ 537.099644] ? finish_task_switch+0x1d3/0x870 [ 537.104125] ? syscall_return_slowpath+0x5e0/0x5e0 [ 537.109042] ? syscall_return_slowpath+0x31d/0x5e0 [ 537.113956] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 537.119308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 537.124140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.129309] RIP: 0033:0x455a79 11:48:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") link(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='./file0/file0\x00') ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x3, 0x1a7e7a4a, 0x1}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = semget$private(0x0, 0x0, 0x200) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x10080, 0x0) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f0000000540)=""/200) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000002000)=""/4096) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file1\x00', 0x1, 0x100) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000002c0)=0x5, 0x4) [ 537.132475] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.151697] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 537.159390] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 537.166640] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 537.173889] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 537.181145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 537.188395] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000013 11:48:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x800000, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000480)=0xfffffffffffffff8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000004000), 0x102a) r3 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0xffffffffa1e00afa, 0x40) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000003c0)=""/129) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x0, 0x3}}, 0x20) renameat(r2, &(0x7f0000000300)='./file0\x00', r2, &(0x7f0000000340)='./file0/file0\x00') 11:48:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400feffff0700", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:02 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x2000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:02 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x142, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) [ 537.313396] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:48:02 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xa00, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x40, &(0x7f0000000040)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:48:02 executing program 4 (fault-call:2 fault-nth:20): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 537.356810] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:48:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 537.460446] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 537.468719] FAULT_INJECTION: forcing a failure. [ 537.468719] name failslab, interval 1, probability 0, space 0, times 0 [ 537.477688] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 537.480937] CPU: 1 PID: 30294 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 537.497452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.506807] Call Trace: [ 537.509411] dump_stack+0x1c9/0x2b4 [ 537.513045] ? dump_stack_print_info.cold.2+0x52/0x52 [ 537.518242] ? kernel_text_address+0x79/0xf0 [ 537.522664] should_fail.cold.4+0xa/0x1a [ 537.526737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 537.531850] ? graph_lock+0x170/0x170 [ 537.535661] ? save_stack+0x43/0xd0 [ 537.539297] ? kasan_kmalloc+0xc4/0xe0 [ 537.543188] ? __kmalloc+0x14e/0x760 [ 537.546918] ? find_held_lock+0x36/0x1c0 [ 537.550987] ? __lock_is_held+0xb5/0x140 [ 537.555057] ? check_same_owner+0x340/0x340 11:48:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2864916ffbd964266f9d511d2f000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) fstatfs(r0, &(0x7f0000000240)=""/66) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socketpair$inet(0x2, 0x0, 0x3, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003000)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000880)=[{&(0x7f00000003c0)=""/5, 0x5}, {&(0x7f0000000400)=""/147, 0x93}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/152, 0x98}, {&(0x7f0000000580)=""/192, 0xc0}, {&(0x7f0000000640)=""/50, 0x32}, {&(0x7f0000000680)=""/94, 0x5e}, {&(0x7f0000000700)=""/174, 0xae}, {&(0x7f00000007c0)=""/136, 0x88}], 0x9, &(0x7f0000000940)=""/94, 0x5e, 0x24a2}, 0x4}, {{&(0x7f00000009c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000a40)=""/2, 0x2}, {&(0x7f0000000a80)=""/19, 0x13}, {&(0x7f0000000ac0)=""/63, 0x3f}, {&(0x7f0000000b00)=""/173, 0xad}, {&(0x7f0000000bc0)=""/184, 0xb8}, {&(0x7f0000000c80)=""/219, 0xdb}, {&(0x7f0000000d80)=""/227, 0xe3}, {&(0x7f0000000e80)=""/34, 0x22}, {&(0x7f0000000ec0)=""/45, 0x2d}], 0x9, 0x0, 0x0, 0x463964c7}, 0x6}], 0x2, 0x40000100, &(0x7f0000000fc0)={0x0, 0x989680}) socket$inet_dccp(0x2, 0x6, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) 11:48:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x100000000, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x6) write$FUSE_OPEN(r2, &(0x7f00000000c0)={0x20, 0xffffffffffffffda, 0x1, {0x0, 0x4}}, 0x20) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) 11:48:02 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0xe087ffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 537.559382] ? rcu_note_context_switch+0x730/0x730 [ 537.564318] __should_failslab+0x124/0x180 [ 537.568558] should_failslab+0x9/0x14 [ 537.572364] kmem_cache_alloc_node_trace+0x26f/0x770 [ 537.577490] __kmalloc_node+0x33/0x70 [ 537.581298] kvmalloc_node+0x65/0xf0 [ 537.585017] __list_lru_init+0x56d/0x7c0 [ 537.589079] ? list_lru_destroy+0x4d0/0x4d0 [ 537.593405] ? __lockdep_init_map+0x105/0x590 [ 537.597901] ? __init_waitqueue_head+0x9e/0x150 [ 537.602571] ? init_wait_entry+0x1c0/0x1c0 [ 537.606814] sget_userns+0x782/0xf20 [ 537.610527] ? get_anon_bdev+0x300/0x300 [ 537.614596] ? destroy_unused_super.part.11+0x110/0x110 [ 537.619960] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 537.624807] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 537.629831] ? cap_capable+0x1f9/0x260 [ 537.633726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.639265] ? security_capable+0x99/0xc0 [ 537.643415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.648951] ? ns_capable_common+0x13f/0x170 [ 537.653366] ? get_anon_bdev+0x300/0x300 [ 537.657425] sget+0x10b/0x150 [ 537.660535] ? fuse_get_root_inode+0x1b0/0x1b0 [ 537.665117] mount_nodev+0x33/0x110 [ 537.668746] fuse_mount+0x2c/0x40 [ 537.672198] mount_fs+0xae/0x328 [ 537.675568] vfs_kern_mount.part.34+0xdc/0x4e0 [ 537.680154] ? may_umount+0xb0/0xb0 [ 537.683779] ? _raw_read_unlock+0x22/0x30 [ 537.687921] ? __get_fs_type+0x97/0xc0 [ 537.691812] do_mount+0x581/0x30e0 [ 537.695355] ? copy_mount_string+0x40/0x40 [ 537.699594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.704352] ? retint_kernel+0x10/0x10 [ 537.708255] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 537.713704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.719237] ? copy_mount_options+0x285/0x380 [ 537.723736] ksys_mount+0x12d/0x140 [ 537.727370] __x64_sys_mount+0xbe/0x150 [ 537.731344] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 537.736367] do_syscall_64+0x1b9/0x820 [ 537.740255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 537.745185] ? syscall_return_slowpath+0x31d/0x5e0 [ 537.750116] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 537.755482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 537.760334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.765524] RIP: 0033:0x455a79 [ 537.768703] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.788067] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 537.795775] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 537.803038] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 537.810306] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 537.817569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 537.824837] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000014 11:48:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x14) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000200", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:03 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x7a8d010000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:03 executing program 4 (fault-call:2 fault-nth:21): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 538.270276] FAULT_INJECTION: forcing a failure. [ 538.270276] name failslab, interval 1, probability 0, space 0, times 0 [ 538.279786] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 538.281689] CPU: 0 PID: 30329 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 538.298092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.307443] Call Trace: [ 538.310042] dump_stack+0x1c9/0x2b4 [ 538.313685] ? dump_stack_print_info.cold.2+0x52/0x52 [ 538.318889] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 538.323740] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 538.326273] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 538.328168] should_fail.cold.4+0xa/0x1a [ 538.328193] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 538.328215] ? unwind_get_return_address+0x61/0xa0 [ 538.351432] ? __save_stack_trace+0x8d/0xf0 [ 538.355766] ? graph_lock+0x170/0x170 [ 538.359584] ? find_held_lock+0x36/0x1c0 [ 538.363654] ? __lock_is_held+0xb5/0x140 [ 538.367729] ? check_same_owner+0x340/0x340 [ 538.372058] ? rcu_note_context_switch+0x730/0x730 [ 538.376997] __should_failslab+0x124/0x180 [ 538.381239] should_failslab+0x9/0x14 [ 538.385047] kmem_cache_alloc_trace+0x2cb/0x780 [ 538.389717] ? __kmalloc_node+0x33/0x70 [ 538.393697] ? __kmalloc_node+0x33/0x70 [ 538.397680] ? rcu_read_lock_sched_held+0x108/0x120 [ 538.402711] __memcg_init_list_lru_node+0x185/0x2d0 [ 538.407734] ? kvfree_rcu+0x20/0x20 [ 538.411367] ? __kmalloc_node+0x47/0x70 [ 538.415355] __list_lru_init+0x46a/0x7c0 [ 538.419429] ? list_lru_destroy+0x4d0/0x4d0 [ 538.423752] ? __lockdep_init_map+0x105/0x590 [ 538.428237] ? __init_waitqueue_head+0x9e/0x150 [ 538.432892] ? init_wait_entry+0x1c0/0x1c0 [ 538.437125] sget_userns+0x782/0xf20 [ 538.440833] ? get_anon_bdev+0x300/0x300 [ 538.444889] ? destroy_unused_super.part.11+0x110/0x110 [ 538.450241] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 538.455077] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 538.460089] ? cap_capable+0x1f9/0x260 [ 538.463973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.469498] ? security_capable+0x99/0xc0 [ 538.473638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.479161] ? ns_capable_common+0x13f/0x170 [ 538.483559] ? get_anon_bdev+0x300/0x300 [ 538.487609] sget+0x10b/0x150 [ 538.490707] ? fuse_get_root_inode+0x1b0/0x1b0 [ 538.495277] mount_nodev+0x33/0x110 [ 538.498894] fuse_mount+0x2c/0x40 [ 538.502345] mount_fs+0xae/0x328 [ 538.505716] vfs_kern_mount.part.34+0xdc/0x4e0 [ 538.510288] ? may_umount+0xb0/0xb0 [ 538.513904] ? _raw_read_unlock+0x22/0x30 [ 538.518042] ? __get_fs_type+0x97/0xc0 [ 538.521922] do_mount+0x581/0x30e0 [ 538.525457] ? copy_mount_string+0x40/0x40 [ 538.529679] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.534429] ? retint_kernel+0x10/0x10 [ 538.538312] ? copy_mount_options+0x1e3/0x380 [ 538.542801] ? write_comp_data+0x70/0x70 [ 538.546858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.552380] ? copy_mount_options+0x285/0x380 [ 538.556865] ksys_mount+0x12d/0x140 [ 538.560480] __x64_sys_mount+0xbe/0x150 [ 538.564440] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 538.569447] do_syscall_64+0x1b9/0x820 [ 538.573321] ? finish_task_switch+0x1d3/0x870 [ 538.577807] ? syscall_return_slowpath+0x5e0/0x5e0 [ 538.582726] ? syscall_return_slowpath+0x31d/0x5e0 [ 538.587647] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 538.593004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 538.597848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.603027] RIP: 0033:0x455a79 [ 538.606198] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.625526] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 538.633220] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 538.640475] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 538.647729] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 538.654983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 538.662240] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000015 11:48:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = accept(0xffffffffffffffff, &(0x7f0000000180)=@ax25, &(0x7f0000000080)=0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000012104625b73c17f260960f32247cc07dacbdbf13778169d0ab81d436d862e63a85534940a6bbfae115a00d8be36c0c206501262ec2203bc1080300000000000000f268b3bde7c41d4601548bff8601f90f480b62943fde11e013bff462d231a4694ce4461b0ad3427e"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000000)) 11:48:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030b03030303030303030303030303030343030561f5f530367dc71d41430302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c02000000000000003dcc", @ANYRESDEC=0x0, @ANYBLOB='B=']) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000540)={0x4, 0x70, 0x800, 0x1, 0x6, 0x3, 0x0, 0x3f, 0x8, 0x2, 0xffffffffffff107b, 0x7, 0x800, 0x0, 0x614, 0x8, 0x4, 0x6a9a, 0x2000000000000003, 0x101, 0x80000000, 0x0, 0x886, 0x9, 0x0, 0x101, 0x3b9c517, 0xbb2, 0x4, 0x564, 0x4006, 0x9, 0x5, 0x6, 0x2, 0x800, 0x7, 0x8, 0x0, 0x80000000, 0x20000000, @perf_bp={&(0x7f00000003c0), 0x5}, 0x4000, 0xfffffffffffffff8, 0x8aa, 0x7, 0xffffffffffffffff, 0x1, 0x8}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) recvmmsg(r2, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000005c0)=""/183, 0xb7}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/41, 0x29}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000000680)=""/188, 0xbc}], 0x5, &(0x7f00000007c0)=""/45, 0x2d, 0x800}, 0x800}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000800)=""/51, 0x33}], 0x1, &(0x7f0000000880)=""/167, 0xa7, 0x100000000}, 0x3}], 0x2, 0x10140, &(0x7f00000009c0)={0x77359400}) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x1, {0x100000000000000}}, 0x20) r3 = accept(0xffffffffffffffff, &(0x7f0000000240)=@sco, &(0x7f00000002c0)=0x80) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000340)={0x3, 'veth0_to_bond\x00', 0x2}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) bind$vsock_dgram(r4, &(0x7f0000000180)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x0, 0x0) 11:48:03 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x4c00000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000007fffffff00", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:03 executing program 4 (fault-call:2 fault-nth:22): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 538.806119] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 538.810985] FAULT_INJECTION: forcing a failure. [ 538.810985] name failslab, interval 1, probability 0, space 0, times 0 [ 538.826628] CPU: 0 PID: 30357 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 538.833988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.843343] Call Trace: [ 538.845942] dump_stack+0x1c9/0x2b4 [ 538.849579] ? dump_stack_print_info.cold.2+0x52/0x52 [ 538.854784] ? kernel_text_address+0x79/0xf0 [ 538.854861] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 538.859203] should_fail.cold.4+0xa/0x1a [ 538.859229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 538.859253] ? graph_lock+0x170/0x170 [ 538.859276] ? save_stack+0x43/0xd0 [ 538.884965] ? kasan_kmalloc+0xc4/0xe0 [ 538.888848] ? __kmalloc+0x14e/0x760 [ 538.892566] ? find_held_lock+0x36/0x1c0 [ 538.896636] ? __lock_is_held+0xb5/0x140 [ 538.900708] ? check_same_owner+0x340/0x340 [ 538.905034] ? rcu_note_context_switch+0x730/0x730 [ 538.909966] __should_failslab+0x124/0x180 [ 538.914204] should_failslab+0x9/0x14 [ 538.918006] kmem_cache_alloc_node_trace+0x26f/0x770 [ 538.923125] __kmalloc_node+0x33/0x70 [ 538.926929] kvmalloc_node+0x65/0xf0 [ 538.930648] __list_lru_init+0x56d/0x7c0 [ 538.934717] ? list_lru_destroy+0x4d0/0x4d0 [ 538.939041] ? __lockdep_init_map+0x105/0x590 [ 538.943543] ? __init_waitqueue_head+0x9e/0x150 [ 538.948215] ? init_wait_entry+0x1c0/0x1c0 [ 538.952459] sget_userns+0x782/0xf20 [ 538.956172] ? get_anon_bdev+0x300/0x300 [ 538.960241] ? destroy_unused_super.part.11+0x110/0x110 [ 538.965600] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 538.970449] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 538.975474] ? cap_capable+0x1f9/0x260 [ 538.979366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.984900] ? security_capable+0x99/0xc0 [ 538.989052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.994587] ? ns_capable_common+0x13f/0x170 [ 538.999003] ? get_anon_bdev+0x300/0x300 [ 539.003067] sget+0x10b/0x150 [ 539.006180] ? fuse_get_root_inode+0x1b0/0x1b0 [ 539.010767] mount_nodev+0x33/0x110 [ 539.014401] fuse_mount+0x2c/0x40 [ 539.017863] mount_fs+0xae/0x328 [ 539.021237] vfs_kern_mount.part.34+0xdc/0x4e0 [ 539.025823] ? may_umount+0xb0/0xb0 [ 539.029453] ? _raw_read_unlock+0x22/0x30 [ 539.033605] ? __get_fs_type+0x97/0xc0 [ 539.037500] do_mount+0x581/0x30e0 [ 539.041043] ? do_raw_spin_unlock+0xa7/0x2f0 [ 539.045457] ? copy_mount_string+0x40/0x40 [ 539.049703] ? copy_mount_options+0x5f/0x380 [ 539.054112] ? rcu_read_lock_sched_held+0x108/0x120 [ 539.059133] ? kmem_cache_alloc_trace+0x616/0x780 [ 539.063983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.069532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.075074] ? copy_mount_options+0x285/0x380 [ 539.079577] ksys_mount+0x12d/0x140 [ 539.083207] __x64_sys_mount+0xbe/0x150 [ 539.087180] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 539.092198] do_syscall_64+0x1b9/0x820 [ 539.096085] ? finish_task_switch+0x1d3/0x870 [ 539.100584] ? syscall_return_slowpath+0x5e0/0x5e0 11:48:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x200000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="1fef31f5bcd250850464903b49cc9cb7f632e28fc898a90f1eb237938da858643ed534328f7c3c8157fdc1aaa31af24e3297e3ca2ee9eaea3939f50407a5ad3725ca2843ac01f0641d1fdf160e", 0x4d}], 0x1) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000040)={0x1, 0xfffffffffffffffa, 0x5}) 11:48:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000400", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:04 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x1000000000000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000180)=0x4) [ 539.105514] ? syscall_return_slowpath+0x31d/0x5e0 [ 539.110450] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 539.115818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 539.120667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.125852] RIP: 0033:0x455a79 [ 539.129030] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.148394] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 539.156099] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 539.163365] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 539.170635] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 539.177898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 539.185164] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000016 11:48:04 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x900, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 539.207227] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 539.254642] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:48:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x100000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000100)={{0x1, 0x80000001}, 'port1\x00', 0x8, 0xc0000, 0x3b, 0x6, 0x8, 0x9, 0x8, 0x0, 0x1, 0x5}) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r3 = dup(r0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x8, 0x977, 0xfffffffffffffff9, 0xff, 0x33a9}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400800, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x8}) ioctl$VT_RESIZE(r4, 0x402c542c, &(0x7f0000000000)) 11:48:04 executing program 4 (fault-call:2 fault-nth:23): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:04 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='.use\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 539.676532] FAULT_INJECTION: forcing a failure. [ 539.676532] name failslab, interval 1, probability 0, space 0, times 0 [ 539.687846] CPU: 0 PID: 30385 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 539.695201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.704552] Call Trace: [ 539.707144] dump_stack+0x1c9/0x2b4 [ 539.710775] ? dump_stack_print_info.cold.2+0x52/0x52 [ 539.715963] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 539.720378] should_fail.cold.4+0xa/0x1a [ 539.724442] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 539.729545] ? unwind_get_return_address+0x61/0xa0 [ 539.734474] ? __save_stack_trace+0x8d/0xf0 [ 539.738796] ? graph_lock+0x170/0x170 [ 539.742600] ? find_held_lock+0x36/0x1c0 [ 539.746675] ? __lock_is_held+0xb5/0x140 [ 539.750766] ? check_same_owner+0x340/0x340 [ 539.755096] ? rcu_note_context_switch+0x730/0x730 [ 539.760047] __should_failslab+0x124/0x180 [ 539.764290] should_failslab+0x9/0x14 [ 539.768091] kmem_cache_alloc_trace+0x2cb/0x780 [ 539.772760] ? __kmalloc_node+0x33/0x70 [ 539.776730] ? __kmalloc_node+0x33/0x70 [ 539.780714] ? rcu_read_lock_sched_held+0x108/0x120 [ 539.785737] __memcg_init_list_lru_node+0x185/0x2d0 [ 539.790769] ? kvfree_rcu+0x20/0x20 [ 539.794410] ? __kmalloc_node+0x47/0x70 [ 539.798403] __list_lru_init+0x46a/0x7c0 [ 539.802479] ? list_lru_destroy+0x4d0/0x4d0 [ 539.806807] ? __lockdep_init_map+0x105/0x590 [ 539.811306] ? __init_waitqueue_head+0x9e/0x150 [ 539.815974] ? init_wait_entry+0x1c0/0x1c0 [ 539.820227] sget_userns+0x782/0xf20 [ 539.823948] ? get_anon_bdev+0x300/0x300 [ 539.828032] ? destroy_unused_super.part.11+0x110/0x110 [ 539.833408] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 539.838270] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 539.843304] ? cap_capable+0x1f9/0x260 [ 539.847207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.852747] ? security_capable+0x99/0xc0 [ 539.856901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.862444] ? ns_capable_common+0x13f/0x170 [ 539.866857] ? get_anon_bdev+0x300/0x300 [ 539.870922] sget+0x10b/0x150 [ 539.874039] ? fuse_get_root_inode+0x1b0/0x1b0 [ 539.878628] mount_nodev+0x33/0x110 [ 539.882263] fuse_mount+0x2c/0x40 [ 539.885775] mount_fs+0xae/0x328 [ 539.889147] vfs_kern_mount.part.34+0xdc/0x4e0 [ 539.893736] ? may_umount+0xb0/0xb0 [ 539.897364] ? _raw_read_unlock+0x22/0x30 [ 539.901515] ? __get_fs_type+0x97/0xc0 [ 539.905410] do_mount+0x581/0x30e0 [ 539.908949] ? do_raw_spin_unlock+0xa7/0x2f0 [ 539.913354] ? copy_mount_string+0x40/0x40 [ 539.917583] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.922336] ? retint_kernel+0x10/0x10 [ 539.926222] ? copy_mount_options+0x1f0/0x380 [ 539.930707] ? copy_mount_options+0x202/0x380 [ 539.935190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.940714] ? copy_mount_options+0x285/0x380 [ 539.945199] ksys_mount+0x12d/0x140 [ 539.948819] __x64_sys_mount+0xbe/0x150 [ 539.952781] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 539.957791] do_syscall_64+0x1b9/0x820 [ 539.961668] ? finish_task_switch+0x1d3/0x870 [ 539.966150] ? syscall_return_slowpath+0x5e0/0x5e0 [ 539.971069] ? syscall_return_slowpath+0x31d/0x5e0 [ 539.976005] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 539.981370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 539.986207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.991383] RIP: 0033:0x455a79 [ 539.994555] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.013888] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 11:48:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x200200, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) r3 = memfd_create(&(0x7f0000000080)='\x00', 0x1) recvfrom$inet(r3, &(0x7f0000000180)=""/62, 0x3e, 0x40000000, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) renameat2(r1, &(0x7f0000000240)='./file0/file0\x00', r1, &(0x7f00000002c0)='./file0/file0\x00', 0x7) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$sndseq(r3, &(0x7f0000000540)=[{0x4, 0x8, 0x3, 0x2, @tick=0x7, {0x4, 0x401}, {0x100000000000, 0xffffffffffffe918}, @addr={0x7fff, 0x4}}, {0x4, 0x5, 0x1ef1, 0x1, @tick=0x7ff, {0x0, 0x3ff}, {0xffffffff}, @addr={0x200, 0x2}}, {0x1, 0x6f2cd5b7, 0xffffffff95de11be, 0x9, @tick=0x3, {0x4, 0x4}, {0xfffffffffffffffa, 0xfff}, @time=@time}, {0x3, 0x3, 0x800, 0x8001, @time={0x77359400}, {0x6, 0x81}, {0x38d2, 0x6}, @time=@tick=0x8311}, {0x5, 0x7ff, 0x10001, 0x7, @time={0x0, 0x1c9c380}, {0xbe8d, 0x1}, {0x2, 0x2}, @raw32={[0x5, 0x5, 0x5]}}, {0x3, 0x8, 0x1ff, 0x60000000000000, @tick=0x71, {0x1f, 0x2}, {0x3, 0x3a93}, @result={0x100000000, 0x80000001}}], 0x120) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 540.021582] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 540.028838] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 540.036093] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 540.043346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 540.050601] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000017 11:48:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='l\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x1c}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000280)={r2, 0x7, 0x30, 0x6, 0x7fffffff}, &(0x7f00000002c0)=0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:05 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='/use\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:05 executing program 3: r0 = socket$inet6(0xa, 0x8000f, 0x101) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fchown(r0, r1, r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x1, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)=0x10000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$P9_RFLUSH(r4, &(0x7f00000000c0)={0x7, 0x6d, 0x1}, 0x7) ioctl$VT_RESIZE(r3, 0x402c542c, &(0x7f0000000000)) 11:48:05 executing program 4 (fault-call:2 fault-nth:24): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x42200) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r0, r1, 0x6, 0x2}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x10000) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) finit_module(r1, &(0x7f0000000340)='fuse\x00', 0x1) read$FUSE(r2, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x100000000000000}}, 0x20) [ 540.380505] FAULT_INJECTION: forcing a failure. [ 540.380505] name failslab, interval 1, probability 0, space 0, times 0 [ 540.389594] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 540.391866] CPU: 1 PID: 30415 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 540.408319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.417671] Call Trace: [ 540.420271] dump_stack+0x1c9/0x2b4 [ 540.423912] ? dump_stack_print_info.cold.2+0x52/0x52 [ 540.426799] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 540.429104] ? __save_stack_trace+0x8d/0xf0 [ 540.429139] should_fail.cold.4+0xa/0x1a [ 540.429163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 540.451763] ? save_stack+0x43/0xd0 [ 540.455391] ? kasan_kmalloc+0xc4/0xe0 [ 540.459281] ? kmem_cache_alloc_trace+0x152/0x780 [ 540.464128] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 540.469318] ? __list_lru_init+0x46a/0x7c0 [ 540.473554] ? sget_userns+0x782/0xf20 [ 540.477443] ? graph_lock+0x170/0x170 [ 540.481247] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 540.486003] ? do_mount+0x581/0x30e0 [ 540.489712] ? ksys_mount+0x12d/0x140 [ 540.493507] ? __x64_sys_mount+0xbe/0x150 [ 540.497651] ? do_syscall_64+0x1b9/0x820 [ 540.501712] ? find_held_lock+0x36/0x1c0 [ 540.505774] ? __lock_is_held+0xb5/0x140 [ 540.509848] ? check_same_owner+0x340/0x340 [ 540.514175] ? rcu_note_context_switch+0x730/0x730 [ 540.519124] __should_failslab+0x124/0x180 [ 540.523364] should_failslab+0x9/0x14 11:48:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00`\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 540.527165] kmem_cache_alloc_trace+0x2cb/0x780 [ 540.531832] ? __kmalloc_node+0x33/0x70 [ 540.535808] ? __kmalloc_node+0x33/0x70 [ 540.539801] ? rcu_read_lock_sched_held+0x108/0x120 [ 540.544824] __memcg_init_list_lru_node+0x185/0x2d0 [ 540.549844] ? kvfree_rcu+0x20/0x20 [ 540.553471] ? __kmalloc_node+0x47/0x70 [ 540.557483] __list_lru_init+0x46a/0x7c0 [ 540.561544] ? list_lru_destroy+0x4d0/0x4d0 [ 540.565863] ? __lockdep_init_map+0x105/0x590 [ 540.570365] ? __init_waitqueue_head+0x9e/0x150 [ 540.575036] ? init_wait_entry+0x1c0/0x1c0 11:48:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x3ff, 0x408000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000140)={{0xffffffffffffffff, 0x1, 0x4, 0x1, 0x4}, 0x80, 0xff, 0x7f}) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000480)=0x8) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000400)=0x1, 0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0xfffffffffffeffff, @dev={0xfe, 0x80, [], 0x1b}, 0x5dc6}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000300)={r4, 0x3fcf, 0xffff}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000003c0)=0x84c, 0x4) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000440)={'teql0\x00', 0x7}) ioctl$VT_RESIZE(r2, 0x402c542c, &(0x7f0000000040)={0x9, 0x9}) syz_open_pts(r2, 0x280) [ 540.579289] sget_userns+0x782/0xf20 [ 540.583005] ? get_anon_bdev+0x300/0x300 [ 540.587076] ? destroy_unused_super.part.11+0x110/0x110 [ 540.592443] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 540.597295] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 540.602321] ? cap_capable+0x1f9/0x260 [ 540.606220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.611760] ? security_capable+0x99/0xc0 [ 540.615919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.621471] ? ns_capable_common+0x13f/0x170 [ 540.625885] ? get_anon_bdev+0x300/0x300 11:48:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)={0x0, 0x6}) [ 540.629948] sget+0x10b/0x150 [ 540.633059] ? fuse_get_root_inode+0x1b0/0x1b0 [ 540.637645] mount_nodev+0x33/0x110 [ 540.641275] fuse_mount+0x2c/0x40 [ 540.644730] mount_fs+0xae/0x328 [ 540.648101] vfs_kern_mount.part.34+0xdc/0x4e0 [ 540.652690] ? may_umount+0xb0/0xb0 [ 540.656318] ? _raw_read_unlock+0x22/0x30 [ 540.660466] ? __get_fs_type+0x97/0xc0 [ 540.664364] do_mount+0x581/0x30e0 [ 540.667911] ? do_raw_spin_unlock+0xa7/0x2f0 [ 540.672323] ? copy_mount_string+0x40/0x40 [ 540.676568] ? copy_mount_options+0x5f/0x380 11:48:05 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)="c075736500", 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) [ 540.680984] ? rcu_read_lock_sched_held+0x108/0x120 [ 540.686003] ? kmem_cache_alloc_trace+0x616/0x780 [ 540.690858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 540.696404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.701948] ? copy_mount_options+0x285/0x380 [ 540.706450] ksys_mount+0x12d/0x140 [ 540.710080] __x64_sys_mount+0xbe/0x150 [ 540.714061] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 540.719081] do_syscall_64+0x1b9/0x820 [ 540.722972] ? finish_task_switch+0x1d3/0x870 [ 540.727475] ? syscall_return_slowpath+0x5e0/0x5e0 [ 540.732410] ? syscall_return_slowpath+0x31d/0x5e0 [ 540.737349] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 540.742722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 540.747577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.752761] RIP: 0033:0x455a79 [ 540.755944] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.775313] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 540.783023] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 540.790296] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 540.797567] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 540.804836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 540.812109] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000018 [ 540.830438] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 540.866046] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:48:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0xf6ffffff00000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:48:05 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='euse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000500", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 541.010870] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 541.030692] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace 11:48:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x126e) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c66b6f1f3e8abfdc2069f360914be061545e581744a"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000000c0)=0x280) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) r3 = fcntl$getown(r2, 0x9) write$cgroup_pid(r2, &(0x7f0000000100)=r3, 0x12) 11:48:06 executing program 4 (fault-call:2 fault-nth:25): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000600", 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) 11:48:06 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fXse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 541.242556] FAULT_INJECTION: forcing a failure. [ 541.242556] name failslab, interval 1, probability 0, space 0, times 0 [ 541.253871] CPU: 1 PID: 30465 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 541.261246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.270600] Call Trace: [ 541.273199] dump_stack+0x1c9/0x2b4 [ 541.276836] ? dump_stack_print_info.cold.2+0x52/0x52 [ 541.282039] ? __save_stack_trace+0x8d/0xf0 [ 541.286382] should_fail.cold.4+0xa/0x1a [ 541.290460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 541.295573] ? save_stack+0x43/0xd0 [ 541.299211] ? kasan_kmalloc+0xc4/0xe0 [ 541.303104] ? kmem_cache_alloc_trace+0x152/0x780 [ 541.307948] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 541.313135] ? __list_lru_init+0x46a/0x7c0 [ 541.317374] ? sget_userns+0x782/0xf20 [ 541.321262] ? graph_lock+0x170/0x170 [ 541.325067] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 541.329823] ? do_mount+0x581/0x30e0 [ 541.333538] ? ksys_mount+0x12d/0x140 [ 541.337340] ? __x64_sys_mount+0xbe/0x150 [ 541.341492] ? do_syscall_64+0x1b9/0x820 [ 541.345565] ? find_held_lock+0x36/0x1c0 [ 541.349637] ? __lock_is_held+0xb5/0x140 [ 541.353714] ? check_same_owner+0x340/0x340 [ 541.358040] ? rcu_note_context_switch+0x730/0x730 [ 541.362979] __should_failslab+0x124/0x180 [ 541.367217] should_failslab+0x9/0x14 [ 541.371018] kmem_cache_alloc_trace+0x2cb/0x780 [ 541.375692] ? __kmalloc_node+0x33/0x70 [ 541.379681] ? __kmalloc_node+0x33/0x70 [ 541.383669] ? rcu_read_lock_sched_held+0x108/0x120 [ 541.388694] __memcg_init_list_lru_node+0x185/0x2d0 [ 541.393719] ? kvfree_rcu+0x20/0x20 [ 541.397347] ? __kmalloc_node+0x47/0x70 [ 541.401350] __list_lru_init+0x46a/0x7c0 [ 541.405415] ? list_lru_destroy+0x4d0/0x4d0 [ 541.409738] ? __lockdep_init_map+0x105/0x590 [ 541.414236] ? __init_waitqueue_head+0x9e/0x150 [ 541.418905] ? init_wait_entry+0x1c0/0x1c0 [ 541.423153] sget_userns+0x782/0xf20 [ 541.426864] ? get_anon_bdev+0x300/0x300 [ 541.430934] ? destroy_unused_super.part.11+0x110/0x110 [ 541.436297] ? __alloc_pages_nodemask+0xb10/0xdb0 [ 541.441146] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 541.446170] ? cap_capable+0x1f9/0x260 [ 541.450066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.455599] ? security_capable+0x99/0xc0 [ 541.459753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.465292] ? ns_capable_common+0x13f/0x170 [ 541.469705] ? get_anon_bdev+0x300/0x300 [ 541.473763] sget+0x10b/0x150 [ 541.476871] ? fuse_get_root_inode+0x1b0/0x1b0 [ 541.481458] mount_nodev+0x33/0x110 [ 541.485088] fuse_mount+0x2c/0x40 [ 541.488539] mount_fs+0xae/0x328 [ 541.491910] vfs_kern_mount.part.34+0xdc/0x4e0 [ 541.496501] ? may_umount+0xb0/0xb0 [ 541.500128] ? _raw_read_unlock+0x22/0x30 [ 541.504272] ? __get_fs_type+0x97/0xc0 [ 541.508160] do_mount+0x581/0x30e0 [ 541.511703] ? copy_mount_string+0x40/0x40 [ 541.515946] ? copy_mount_options+0x5f/0x380 [ 541.520357] ? rcu_read_lock_sched_held+0x108/0x120 [ 541.525373] ? kmem_cache_alloc_trace+0x616/0x780 [ 541.530217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.535752] ? _copy_from_user+0xdf/0x150 [ 541.539916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.545450] ? copy_mount_options+0x285/0x380 [ 541.549949] ksys_mount+0x12d/0x140 [ 541.553578] __x64_sys_mount+0xbe/0x150 [ 541.557549] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 541.562564] do_syscall_64+0x1b9/0x820 [ 541.566446] ? finish_task_switch+0x1d3/0x870 [ 541.570938] ? syscall_return_slowpath+0x5e0/0x5e0 [ 541.575866] ? syscall_return_slowpath+0x31d/0x5e0 [ 541.580800] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 541.586167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 541.591014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.596199] RIP: 0033:0x455a79 [ 541.599383] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.618766] RSP: 002b:00007f7878d54c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 541.626472] RAX: ffffffffffffffda RBX: 00007f7878d556d4 RCX: 0000000000455a79 [ 541.633737] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 541.641003] RBP: 000000000072bea0 R08: 0000000020000400 R09: 0000000000000000 [ 541.648270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 541.655533] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000019 [ 541.687359] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 541.745065] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 717.791220] INFO: task syz-executor0:30440 blocked for more than 140 seconds. [ 717.798574] Not tainted 4.18.0-rc4+ #143 [ 717.803186] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 717.811163] syz-executor0 D24152 30440 4562 0x00000004 [ 717.816820] Call Trace: [ 717.819437] __schedule+0x87c/0x1ed0 [ 717.823179] ? __sched_text_start+0x8/0x8 [ 717.827348] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 717.831957] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 717.837088] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 717.842128] ? trace_hardirqs_on+0xd/0x10 [ 717.846297] ? prepare_to_wait_event+0x396/0xc70 [ 717.851080] ? prepare_to_wait_exclusive+0x550/0x550 [ 717.856224] schedule+0xfb/0x450 [ 717.859613] ? __schedule+0x1ed0/0x1ed0 [ 717.863611] ? check_same_owner+0x340/0x340 [ 717.867951] ? do_raw_spin_unlock+0xa7/0x2f0 [ 717.872384] ? replenish_dl_entity.cold.53+0x37/0x37 [ 717.877521] request_wait_answer+0x4c8/0x920 [ 717.881953] ? fuse_read_forget.isra.22+0xdc0/0xdc0 [ 717.886989] ? finish_wait+0x430/0x430 [ 717.890903] ? finish_wait+0x430/0x430 [ 717.894819] ? finish_wait+0x430/0x430 [ 717.898729] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 717.903330] ? fuse_dev_ioctl+0x430/0x430 [ 717.907500] ? kasan_check_write+0x14/0x20 [ 717.911754] ? do_raw_spin_lock+0xc1/0x200 [ 717.916041] __fuse_request_send+0x12a/0x1d0 [ 717.920497] fuse_request_send+0x62/0xa0 [ 717.924603] fuse_simple_request+0x33d/0x730 [ 717.929045] fuse_lookup_name+0x3ee/0x830 [ 717.933235] ? fuse_valid_type+0xb0/0xb0 [ 717.937339] ? mutex_lock_nested+0x16/0x20 [ 717.941617] fuse_lookup+0xf9/0x4c0 [ 717.945281] ? do_raw_spin_unlock+0xa7/0x2f0 [ 717.949729] ? fuse_lookup_name+0x830/0x830 [ 717.954082] ? kasan_check_write+0x14/0x20 [ 717.958358] ? do_raw_spin_lock+0xc1/0x200 [ 717.962637] __lookup_hash+0x12e/0x190 [ 717.966565] filename_create+0x1e5/0x5b0 [ 717.970653] ? kern_path_mountpoint+0x40/0x40 [ 717.975189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.980754] ? getname_flags+0x26e/0x5a0 [ 717.984862] do_mkdirat+0xda/0x310 [ 717.988434] ? __ia32_sys_mknod+0xb0/0xb0 [ 717.992622] ? ksys_ioctl+0x81/0xd0 [ 717.996278] __x64_sys_mkdirat+0x76/0xb0 [ 718.000382] do_syscall_64+0x1b9/0x820 [ 718.004291] ? finish_task_switch+0x1d3/0x870 [ 718.008828] ? syscall_return_slowpath+0x5e0/0x5e0 [ 718.013784] ? syscall_return_slowpath+0x31d/0x5e0 [ 718.018765] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 718.024161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.029056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.034283] RIP: 0033:0x455a79 [ 718.037501] Code: 0f 0b e8 5a 44 fd ff 0f 0b e8 c3 44 fd ff 0f 0b e8 4c 44 fd ff 0f 0b e8 05 68 fd ff 48 8d 05 a4 9a 48 00 48 89 04 24 48 c7 44 <24> 08 1d 00 00 00 e8 8c 71 fd ff e8 37 6a fd ff 0f b6 44 24 2f 83 [ 718.056914] RSP: 002b:00007f5c735c8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 718.064647] RAX: ffffffffffffffda RBX: 00007f5c735c96d4 RCX: 0000000000455a79 [ 718.071954] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 718.079242] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 718.086548] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 718.093837] R13: 00000000004c00fc R14: 00000000004cfc78 R15: 0000000000000000 [ 718.101161] INFO: task syz-executor0:30474 blocked for more than 140 seconds. [ 718.108450] Not tainted 4.18.0-rc4+ #143 [ 718.113065] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 718.121049] syz-executor0 D24904 30474 4562 0x00000004 [ 718.126722] Call Trace: [ 718.129334] __schedule+0x87c/0x1ed0 [ 718.133097] ? __sched_text_start+0x8/0x8 [ 718.137278] ? graph_lock+0x170/0x170 [ 718.141122] ? graph_lock+0x170/0x170 [ 718.144947] ? trace_hardirqs_on+0x10/0x10 [ 718.149219] ? graph_lock+0x170/0x170 [ 718.153057] schedule+0xfb/0x450 [ 718.156462] ? lock_downgrade+0x8f0/0x8f0 [ 718.160633] ? __schedule+0x1ed0/0x1ed0 [ 718.164653] ? mark_held_locks+0xc9/0x160 [ 718.168857] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 718.173484] ? _raw_spin_unlock_irq+0x27/0x70 [ 718.178009] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.183098] __rwsem_down_write_failed_common+0x95d/0x1630 [ 718.188767] ? rwsem_spin_on_owner+0xa40/0xa40 [ 718.193387] ? trace_hardirqs_on+0x10/0x10 [ 718.197664] ? rcu_is_watching+0x8c/0x150 [ 718.201834] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 718.206278] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 718.210719] ? is_bpf_text_address+0xd7/0x170 [ 718.215255] ? kernel_text_address+0x79/0xf0 [ 718.219688] ? __kernel_text_address+0xd/0x40 [ 718.224222] ? unwind_get_return_address+0x61/0xa0 [ 718.229188] ? save_stack+0xa9/0xd0 [ 718.232856] ? kasan_kmalloc+0xc4/0xe0 [ 718.236767] ? __kmalloc_track_caller+0x14a/0x760 [ 718.241646] ? kstrdup+0x39/0x70 [ 718.245044] ? do_mount+0x263c/0x30e0 [ 718.248881] ? ksys_mount+0x12d/0x140 [ 718.252707] ? __x64_sys_mount+0xbe/0x150 [ 718.256893] ? do_syscall_64+0x1b9/0x820 [ 718.260977] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.266387] ? lock_downgrade+0x8f0/0x8f0 [ 718.270564] ? lock_acquire+0x1e4/0x540 [ 718.274570] ? lock_mount+0x8c/0x2e0 [ 718.278320] ? lock_release+0xa30/0xa30 [ 718.282334] ? check_same_owner+0x340/0x340 [ 718.286688] rwsem_down_write_failed+0xe/0x10 [ 718.291219] ? rwsem_down_write_failed+0xe/0x10 [ 718.295908] call_rwsem_down_write_failed+0x17/0x30 [ 718.300964] down_write+0xaa/0x130 [ 718.304546] ? lock_mount+0x8c/0x2e0 [ 718.308298] ? down_read+0x1d0/0x1d0 [ 718.312060] ? rcu_read_lock_sched_held+0x108/0x120 [ 718.317120] lock_mount+0x8c/0x2e0 [ 718.320681] ? may_umount+0xb0/0xb0 [ 718.324350] do_add_mount+0x27/0x370 [ 718.328096] do_mount+0x193f/0x30e0 [ 718.331769] ? copy_mount_string+0x40/0x40 [ 718.336049] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.340860] ? retint_kernel+0x10/0x10 [ 718.344781] ? copy_mount_options+0x1f0/0x380 [ 718.349315] ? copy_mount_options+0x1f3/0x380 [ 718.353837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.359412] ? copy_mount_options+0x285/0x380 [ 718.363943] ksys_mount+0x12d/0x140 [ 718.367614] __x64_sys_mount+0xbe/0x150 [ 718.371616] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.376671] do_syscall_64+0x1b9/0x820 [ 718.380587] ? finish_task_switch+0x1d3/0x870 [ 718.385124] ? syscall_return_slowpath+0x5e0/0x5e0 [ 718.390087] ? syscall_return_slowpath+0x31d/0x5e0 [ 718.395058] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 718.400458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.405347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.410560] RIP: 0033:0x455a79 [ 718.413779] Code: 0f 0b e8 5a 44 fd ff 0f 0b e8 c3 44 fd ff 0f 0b e8 4c 44 fd ff 0f 0b e8 05 68 fd ff 48 8d 05 a4 9a 48 00 48 89 04 24 48 c7 44 <24> 08 1d 00 00 00 e8 8c 71 fd ff e8 37 6a fd ff 0f b6 44 24 2f 83 [ 718.433228] RSP: 002b:00007f5c735a7c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 718.440963] RAX: ffffffffffffffda RBX: 00007f5c735a86d4 RCX: 0000000000455a79 [ 718.448271] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 718.455559] RBP: 000000000072bf48 R08: 0000000020000400 R09: 0000000000000000 [ 718.462864] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 718.470154] R13: 00000000004c021d R14: 00000000004cfeb8 R15: 0000000000000001 [ 718.477498] INFO: task syz-executor0:30484 blocked for more than 140 seconds. [ 718.484785] Not tainted 4.18.0-rc4+ #143 [ 718.489387] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 718.497374] syz-executor0 D25408 30484 4562 0x00000004 [ 718.503047] Call Trace: [ 718.505667] __schedule+0x87c/0x1ed0 [ 718.509524] ? lock_downgrade+0x8f0/0x8f0 [ 718.513702] ? __sched_text_start+0x8/0x8 [ 718.517894] ? print_usage_bug+0xc0/0xc0 [ 718.521981] ? graph_lock+0x170/0x170 [ 718.525857] ? graph_lock+0x170/0x170 [ 718.529685] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.534742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.540307] ? __follow_mount_rcu.isra.36.part.37+0x175/0x890 [ 718.546243] schedule+0xfb/0x450 [ 718.549635] ? lock_downgrade+0x8f0/0x8f0 [ 718.553821] ? __schedule+0x1ed0/0x1ed0 [ 718.557827] ? mark_held_locks+0xc9/0x160 [ 718.562077] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 718.566696] ? _raw_spin_unlock_irq+0x27/0x70 [ 718.571214] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.576268] __rwsem_down_write_failed_common+0x95d/0x1630 [ 718.581923] ? rwsem_spin_on_owner+0xa40/0xa40 [ 718.586532] ? __lock_acquire+0x7fc/0x5020 [ 718.590804] ? trace_hardirqs_on+0x10/0x10 [ 718.595078] ? find_held_lock+0x36/0x1c0 [ 718.599168] ? find_held_lock+0x36/0x1c0 [ 718.603273] ? lock_downgrade+0x8f0/0x8f0 [ 718.607445] ? kasan_check_read+0x11/0x20 [ 718.611625] ? dput.part.26+0x276/0x7a0 [ 718.615620] ? graph_lock+0x170/0x170 [ 718.619456] ? shrink_dcache_sb+0x350/0x350 [ 718.623802] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 718.628850] ? mntput+0x74/0xa0 [ 718.632158] ? lock_acquire+0x1e4/0x540 [ 718.636157] ? filename_create+0x1b2/0x5b0 [ 718.640417] ? mnt_want_write+0x3f/0xc0 [ 718.644428] ? lock_release+0xa30/0xa30 [ 718.648424] ? check_same_owner+0x340/0x340 [ 718.652782] rwsem_down_write_failed+0xe/0x10 [ 718.657299] ? rwsem_down_write_failed+0xe/0x10 [ 718.661998] call_rwsem_down_write_failed+0x17/0x30 [ 718.667049] down_write_nested+0xae/0x130 [ 718.671231] ? filename_create+0x1b2/0x5b0 [ 718.675485] ? _down_write_nest_lock+0x130/0x130 [ 718.680271] ? __sb_start_write+0x17f/0x300 [ 718.684619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.690192] filename_create+0x1b2/0x5b0 [ 718.694285] ? kern_path_mountpoint+0x40/0x40 [ 718.699858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.705415] ? getname_flags+0x26e/0x5a0 [ 718.709516] do_mkdirat+0xda/0x310 [ 718.713081] ? __ia32_sys_mknod+0xb0/0xb0 [ 718.717262] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.722835] ? ksys_ioctl+0x81/0xd0 [ 718.726496] __x64_sys_mkdirat+0x76/0xb0 [ 718.730588] do_syscall_64+0x1b9/0x820 [ 718.734502] ? finish_task_switch+0x1d3/0x870 [ 718.739043] ? syscall_return_slowpath+0x5e0/0x5e0 [ 718.744009] ? syscall_return_slowpath+0x31d/0x5e0 [ 718.748983] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 718.754394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.759265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.764479] RIP: 0033:0x455a79 [ 718.767683] Code: 0f 0b e8 5a 44 fd ff 0f 0b e8 c3 44 fd ff 0f 0b e8 4c 44 fd ff 0f 0b e8 05 68 fd ff 48 8d 05 a4 9a 48 00 48 89 04 24 48 c7 44 <24> 08 1d 00 00 00 e8 8c 71 fd ff e8 37 6a fd ff 0f b6 44 24 2f 83 [ 718.787129] RSP: 002b:00007f5c73565c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 718.794860] RAX: ffffffffffffffda RBX: 00007f5c735666d4 RCX: 0000000000455a79 [ 718.802156] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 718.809446] RBP: 000000000072c098 R08: 0000000000000000 R09: 0000000000000000 [ 718.816739] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 718.824028] R13: 00000000004c00fc R14: 00000000004cfc78 R15: 0000000000000003 [ 718.831340] [ 718.831340] Showing all locks held in the system: [ 718.837687] 1 lock held by khungtaskd/900: [ 718.841943] #0: 0000000089d844e2 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x428 [ 718.850609] 1 lock held by udevd/2418: [ 718.854525] 1 lock held by rsyslogd/4424: [ 718.858687] #0: 000000004676b763 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 718.866723] 2 locks held by getty/4514: [ 718.870708] #0: 000000008d5dc83f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 718.879000] #1: 0000000079d67a8e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 718.887911] 2 locks held by getty/4515: [ 718.891903] #0: 000000000077810c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 718.900187] #1: 00000000013faa87 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 718.909086] 2 locks held by getty/4516: [ 718.913075] #0: 00000000a31433ea (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 718.921361] #1: 000000000b02ba1c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 718.930252] 2 locks held by getty/4517: [ 718.934246] #0: 00000000ddc43311 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 718.942521] #1: 0000000083d3a266 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 718.951423] 2 locks held by getty/4518: [ 718.955409] #0: 00000000445f4fa0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 718.963694] #1: 00000000a6fed251 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 718.972581] 2 locks held by getty/4519: [ 718.976575] #0: 00000000ff68c89a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 718.984850] #1: 00000000cf9df215 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 718.993747] 2 locks held by getty/4520: [ 718.997731] #0: 0000000053905977 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 719.006043] #1: 00000000dab43fb5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 719.014957] 3 locks held by syz-executor0/30440: [ 719.019735] #0: 00000000bede6997 (sb_writers#14){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 719.027756] #1: 00000000b86b5ce9 (&type->i_mutex_dir_key#5/1){+.+.}, at: filename_create+0x1b2/0x5b0 [ 719.037187] #2: 0000000086d9b913 (&fi->mutex){+.+.}, at: fuse_lock_inode+0xaf/0xe0 [ 719.045039] 1 lock held by syz-executor0/30474: [ 719.049725] #0: 00000000b86b5ce9 (&type->i_mutex_dir_key#5){++++}, at: lock_mount+0x8c/0x2e0 [ 719.058443] 2 locks held by syz-executor0/30484: [ 719.063218] #0: 00000000bede6997 (sb_writers#14){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 719.071244] #1: 00000000b86b5ce9 (&type->i_mutex_dir_key#5/1){+.+.}, at: filename_create+0x1b2/0x5b0 [ 719.080674] [ 719.082314] ============================================= [ 719.082314] [ 719.089362] NMI backtrace for cpu 1 [ 719.093017] CPU: 1 PID: 900 Comm: khungtaskd Not tainted 4.18.0-rc4+ #143 [ 719.099939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.109290] Call Trace: [ 719.111879] dump_stack+0x1c9/0x2b4 [ 719.115510] ? dump_stack_print_info.cold.2+0x52/0x52 [ 719.120700] ? vprintk_default+0x28/0x30 [ 719.124767] nmi_cpu_backtrace.cold.4+0x19/0xce [ 719.129433] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 719.133838] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 719.139021] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 719.144295] arch_trigger_cpumask_backtrace+0x14/0x20 [ 719.149480] watchdog+0x9c4/0xf80 [ 719.152942] ? reset_hung_task_detector+0xd0/0xd0 [ 719.157792] ? kasan_check_read+0x11/0x20 [ 719.161934] ? do_raw_spin_unlock+0xa7/0x2f0 [ 719.166358] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 719.171456] ? __kthread_parkme+0x58/0x1b0 [ 719.175685] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.180698] ? trace_hardirqs_on+0xd/0x10 [ 719.184846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.190375] ? __kthread_parkme+0x106/0x1b0 [ 719.194695] kthread+0x345/0x410 [ 719.198552] ? reset_hung_task_detector+0xd0/0xd0 [ 719.203399] ? kthread_bind+0x40/0x40 [ 719.207202] ret_from_fork+0x3a/0x50 [ 719.210968] Sending NMI from CPU 1 to CPUs 0: [ 719.215489] NMI backtrace for cpu 0 [ 719.215500] CPU: 0 PID: 2418 Comm: udevd Not tainted 4.18.0-rc4+ #143 [ 719.215504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.215516] RIP: 0010:__sanitizer_cov_trace_cmp8+0x1/0x20 [ 719.215518] Code: ff 5d c3 66 0f 1f 44 00 00 55 89 f2 89 fe bf 04 00 00 00 48 89 e5 48 8b 4d 08 e8 ea fe ff ff 5d c3 0f 1f 84 00 00 00 00 00 55 <48> 89 f2 48 89 fe bf 06 00 00 00 48 89 e5 48 8b 4d 08 e8 c8 fe ff [ 719.215640] RSP: 0018:ffff8801ca09fdb0 EFLAGS: 00000293 [ 719.215648] RAX: ffff8801ca090040 RBX: 00007ffd3d4ce120 RCX: ffffffff81da16c8 [ 719.215653] RDX: 0000000000000000 RSI: 00007ffd3d4ce120 RDI: 00007ffffffff000 [ 719.215659] RBP: ffff8801ca09fdf0 R08: ffff8801ca090040 R09: 0000000000000000 [ 719.215664] R10: 0000000000000000 R11: 0000000000000000 R12: 00007ffffffff000 [ 719.215669] R13: 0000000000000008 R14: 00007ffd3d4ce0c0 R15: 0000000000000000 [ 719.215677] FS: 00007f49ed4f87a0(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 719.215682] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 719.215688] CR2: ffffffffff600400 CR3: 00000001ca7c8000 CR4: 00000000001406f0 [ 719.215695] DR0: 0000000020000040 DR1: 0000000000000000 DR2: 0000000000000000 [ 719.215700] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 719.215702] Call Trace: [ 719.215714] ? do_epoll_wait+0xd1/0x200 [ 719.215724] __x64_sys_epoll_wait+0x97/0xf0 [ 719.215735] do_syscall_64+0x1b9/0x820 [ 719.215744] ? syscall_slow_exit_work+0x500/0x500 [ 719.215754] ? syscall_return_slowpath+0x5e0/0x5e0 [ 719.215767] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 719.215777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.215788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.215795] RIP: 0033:0x7f49ecc0c943 [ 719.215796] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 719.215916] RSP: 002b:00007ffd3d4cdfc8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 719.215924] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007f49ecc0c943 [ 719.215929] RDX: 0000000000000008 RSI: 00007ffd3d4ce0c0 RDI: 000000000000000a [ 719.215934] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 719.215939] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 719.215944] R13: 0000000000000000 R14: 00000000012ea1f0 R15: 00000000012de250 [ 719.216492] Kernel panic - not syncing: hung_task: blocked tasks [ 719.449917] CPU: 1 PID: 900 Comm: khungtaskd Not tainted 4.18.0-rc4+ #143 [ 719.456836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.466181] Call Trace: [ 719.468768] dump_stack+0x1c9/0x2b4 [ 719.472396] ? dump_stack_print_info.cold.2+0x52/0x52 [ 719.477584] ? printk_safe_log_store+0x2f0/0x2f0 [ 719.482341] panic+0x238/0x4e7 [ 719.485527] ? add_taint.cold.5+0x16/0x16 [ 719.489673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.495206] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 719.500652] ? printk_safe_flush+0xd7/0x130 [ 719.504975] watchdog+0x9d5/0xf80 [ 719.508434] ? reset_hung_task_detector+0xd0/0xd0 [ 719.513281] ? kasan_check_read+0x11/0x20 [ 719.517426] ? do_raw_spin_unlock+0xa7/0x2f0 [ 719.521835] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 719.526938] ? __kthread_parkme+0x58/0x1b0 [ 719.531174] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.536190] ? trace_hardirqs_on+0xd/0x10 [ 719.540337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.545865] ? __kthread_parkme+0x106/0x1b0 [ 719.550185] kthread+0x345/0x410 [ 719.553547] ? reset_hung_task_detector+0xd0/0xd0 [ 719.558381] ? kthread_bind+0x40/0x40 [ 719.562181] ret_from_fork+0x3a/0x50 [ 719.566605] Dumping ftrace buffer: [ 719.570226] (ftrace buffer empty) [ 719.573914] Kernel Offset: disabled [ 719.577524] Rebooting in 86400 seconds..